<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0081-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-23T10:47:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-23T10:47:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-23T10:47:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.22.5 fixes the following issues:

Security issues fixed:

- CVE-2018-4372, CVE-2018-4345, CVE-2018-4386, CVE-2018-4375, CVE-2018-4376, CVE-2018-4378, CVE-2018-4382,
  CVE-2018-4392, CVE-2018-4416, CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309,
  CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318, CVE-2018-4319,
  CVE-2018-4323, CVE-2018-4328, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361, CVE-2018-4373, CVE-2018-4162, 
  CVE-2018-4163, CVE-2018-4165, CVE-2018-11713, CVE-2018-4207, CVE-2018-4208, CVE-2018-4209, CVE-2018-4210,
  CVE-2018-4212, CVE-2018-4213, CVE-2018-4437, CVE-2018-4438, CVE-2018-4441, CVE-2018-4442, CVE-2018-4443,
  CVE-2018-4464 (bsc#1119558, bsc#1116998, bsc#1110279)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-81</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0081-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110279</URL>
      <Description>SUSE Bug 1110279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1116998</URL>
      <Description>SUSE Bug 1116998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119558</URL>
      <Description>SUSE Bug 1119558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11713/</URL>
      <Description>SUSE CVE CVE-2018-11713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4162/</URL>
      <Description>SUSE CVE CVE-2018-4162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4163/</URL>
      <Description>SUSE CVE CVE-2018-4163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4165/</URL>
      <Description>SUSE CVE CVE-2018-4165 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4191/</URL>
      <Description>SUSE CVE CVE-2018-4191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4197/</URL>
      <Description>SUSE CVE CVE-2018-4197 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4207/</URL>
      <Description>SUSE CVE CVE-2018-4207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4208/</URL>
      <Description>SUSE CVE CVE-2018-4208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4209/</URL>
      <Description>SUSE CVE CVE-2018-4209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4210/</URL>
      <Description>SUSE CVE CVE-2018-4210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4212/</URL>
      <Description>SUSE CVE CVE-2018-4212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4213/</URL>
      <Description>SUSE CVE CVE-2018-4213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4299/</URL>
      <Description>SUSE CVE CVE-2018-4299 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4306/</URL>
      <Description>SUSE CVE CVE-2018-4306 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4309/</URL>
      <Description>SUSE CVE CVE-2018-4309 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4312/</URL>
      <Description>SUSE CVE CVE-2018-4312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4314/</URL>
      <Description>SUSE CVE CVE-2018-4314 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4315/</URL>
      <Description>SUSE CVE CVE-2018-4315 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4316/</URL>
      <Description>SUSE CVE CVE-2018-4316 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4317/</URL>
      <Description>SUSE CVE CVE-2018-4317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4318/</URL>
      <Description>SUSE CVE CVE-2018-4318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4319/</URL>
      <Description>SUSE CVE CVE-2018-4319 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4323/</URL>
      <Description>SUSE CVE CVE-2018-4323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4328/</URL>
      <Description>SUSE CVE CVE-2018-4328 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4345/</URL>
      <Description>SUSE CVE CVE-2018-4345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4358/</URL>
      <Description>SUSE CVE CVE-2018-4358 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4359/</URL>
      <Description>SUSE CVE CVE-2018-4359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4361/</URL>
      <Description>SUSE CVE CVE-2018-4361 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4372/</URL>
      <Description>SUSE CVE CVE-2018-4372 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4373/</URL>
      <Description>SUSE CVE CVE-2018-4373 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4375/</URL>
      <Description>SUSE CVE CVE-2018-4375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4376/</URL>
      <Description>SUSE CVE CVE-2018-4376 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4378/</URL>
      <Description>SUSE CVE CVE-2018-4378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4382/</URL>
      <Description>SUSE CVE CVE-2018-4382 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4386/</URL>
      <Description>SUSE CVE CVE-2018-4386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4392/</URL>
      <Description>SUSE CVE CVE-2018-4392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4416/</URL>
      <Description>SUSE CVE CVE-2018-4416 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4437/</URL>
      <Description>SUSE CVE CVE-2018-4437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4438/</URL>
      <Description>SUSE CVE CVE-2018-4438 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4441/</URL>
      <Description>SUSE CVE CVE-2018-4441 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4442/</URL>
      <Description>SUSE CVE CVE-2018-4442 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4443/</URL>
      <Description>SUSE CVE CVE-2018-4443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4464/</URL>
      <Description>SUSE CVE CVE-2018-4464 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1">libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1">libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1">libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1">libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.22.5-lp150.2.9.1">libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1">typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1">typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1">typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="webkit-jsc-4-2.22.5-lp150.2.9.1">webkit-jsc-4-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1">webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.22.5-lp150.2.9.1">webkit2gtk3-devel-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1">webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1">
      <FullProductName ProductID="webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1">webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1">libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1">libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1">libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1">libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1">libwebkit2gtk3-lang-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1">typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1">typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1">typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1">webkit-jsc-4-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1">webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1">webkit2gtk3-devel-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1">webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1">webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.</Note>
    </Notes>
    <CVE>CVE-2018-11713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11713.html</URL>
        <Description>CVE-2018-11713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096060</URL>
        <Description>SUSE Bug 1096060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4162.html</URL>
        <Description>CVE-2018-4162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4163.html</URL>
        <Description>CVE-2018-4163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4165</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4165.html</URL>
        <Description>CVE-2018-4165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088182</URL>
        <Description>SUSE Bug 1088182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4191.html</URL>
        <Description>CVE-2018-4191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4197.html</URL>
        <Description>CVE-2018-4197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4207.html</URL>
        <Description>CVE-2018-4207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4208.html</URL>
        <Description>CVE-2018-4208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4209.html</URL>
        <Description>CVE-2018-4209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4210.html</URL>
        <Description>CVE-2018-4210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4212.html</URL>
        <Description>CVE-2018-4212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.</Note>
    </Notes>
    <CVE>CVE-2018-4213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4213.html</URL>
        <Description>CVE-2018-4213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4299</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4299.html</URL>
        <Description>CVE-2018-4299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4306</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4306.html</URL>
        <Description>CVE-2018-4306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4309.html</URL>
        <Description>CVE-2018-4309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4312.html</URL>
        <Description>CVE-2018-4312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4314</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4314.html</URL>
        <Description>CVE-2018-4314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4315</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4315.html</URL>
        <Description>CVE-2018-4315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved state management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4316</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4316.html</URL>
        <Description>CVE-2018-4316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4317.html</URL>
        <Description>CVE-2018-4317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4318.html</URL>
        <Description>CVE-2018-4318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4319.html</URL>
        <Description>CVE-2018-4319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4323.html</URL>
        <Description>CVE-2018-4323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4328.html</URL>
        <Description>CVE-2018-4328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4345.html</URL>
        <Description>CVE-2018-4345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4358.html</URL>
        <Description>CVE-2018-4358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4359.html</URL>
        <Description>CVE-2018-4359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory consumption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.</Note>
    </Notes>
    <CVE>CVE-2018-4361</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4361.html</URL>
        <Description>CVE-2018-4361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110279</URL>
        <Description>SUSE Bug 1110279</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4372.html</URL>
        <Description>CVE-2018-4372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4373.html</URL>
        <Description>CVE-2018-4373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4375.html</URL>
        <Description>CVE-2018-4375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4376.html</URL>
        <Description>CVE-2018-4376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4378.html</URL>
        <Description>CVE-2018-4378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4382</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4382.html</URL>
        <Description>CVE-2018-4382</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4386.html</URL>
        <Description>CVE-2018-4386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4392.html</URL>
        <Description>CVE-2018-4392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.</Note>
    </Notes>
    <CVE>CVE-2018-4416</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4416.html</URL>
        <Description>CVE-2018-4416</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116998</URL>
        <Description>SUSE Bug 1116998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4437.html</URL>
        <Description>CVE-2018-4437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119553</URL>
        <Description>SUSE Bug 1119553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4438</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4438.html</URL>
        <Description>CVE-2018-4438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119554</URL>
        <Description>SUSE Bug 1119554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4441.html</URL>
        <Description>CVE-2018-4441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119555</URL>
        <Description>SUSE Bug 1119555</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4442</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4442.html</URL>
        <Description>CVE-2018-4442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119556</URL>
        <Description>SUSE Bug 1119556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4443.html</URL>
        <Description>CVE-2018-4443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119557</URL>
        <Description>SUSE Bug 1119557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.5-lp150.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.5-lp150.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4464.html</URL>
        <Description>CVE-2018-4464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119553</URL>
        <Description>SUSE Bug 1119553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119558</URL>
        <Description>SUSE Bug 1119558</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
