<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2587-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-11-30T15:15:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-11-30T15:15:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-11-30T15:15:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.26.2 fixes the following issues:

Webkit2gtk3 was updated to version 2.26.2 (WSA-2019-0005 and WSA-2019-0006, bsc#1155321 bsc#1156318)  

Security issues addressed:

- CVE-2019-8625: Fixed a logic issue where by processing maliciously crafted web content may lead to
  universal cross site scripting. 
- CVE-2019-8674: Fixed a logic issue where by processing maliciously crafted web content may lead to
  universal cross site scripting.
- CVE-2019-8707: Fixed multiple  memory corruption issues where by processing maliciously crafted web 
  content may lead to arbitrary code execution.
- CVE-2019-8719: Fixed a logic issue where by processing maliciously crafted web content may lead to
  universal cross site scripting.
- CVE-2019-8720: Fixed multiple memory corruption issues where by processing maliciously crafted web   
  content may lead to arbitrary code execution.
- CVE-2019-8726: Fixed multiple memory corruption issues where by processing maliciously crafted web   
  content may lead to arbitrary code execution.
- CVE-2019-8733: Fixed multiple memory corruption issues where by processing maliciously crafted web   
  content may lead to arbitrary code execution.
- CVE-2019-8735: Fixed multiple memory corruption issues where by processing maliciously crafted web   
  content may lead to arbitrary code execution.
- CVE-2019-8763: Fixed multiple  memory corruption issues where by processing maliciously crafted web   
  content may lead to arbitrary code execution.
- CVE-2019-8768: Fixed an issue where a user may be unable to delete browsing history items.
- CVE-2019-8769: Fixed an issue where a maliciously crafted website may reveal browsing history.
- CVE-2019-8771: Fixed an issue where a maliciously crafted web content may violate iframe
  sandboxing policy.
- CVE-2019-8710: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8743: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8764: Fixed a logic issue where by processing maliciously crafted web content may lead to
  universal cross site scripting.
- CVE-2019-8765: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8766: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8782: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8783: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8808: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8811: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8812: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8813: Fixed a logic issue where by processing maliciously crafted web content may lead to
  universal cross site scripting.
- CVE-2019-8814: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8815: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8816: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8819: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8820: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8821: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8822: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.
- CVE-2019-8823: Fixed multiple memory corruption issues where by processing maliciously crafted web
  content may lead to arbitrary code execution.

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2587</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2587-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155321</URL>
      <Description>SUSE Bug 1155321</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156318</URL>
      <Description>SUSE Bug 1156318</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8551/</URL>
      <Description>SUSE CVE CVE-2019-8551 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8558/</URL>
      <Description>SUSE CVE CVE-2019-8558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8559/</URL>
      <Description>SUSE CVE CVE-2019-8559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8563/</URL>
      <Description>SUSE CVE CVE-2019-8563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8625/</URL>
      <Description>SUSE CVE CVE-2019-8625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8674/</URL>
      <Description>SUSE CVE CVE-2019-8674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8681/</URL>
      <Description>SUSE CVE CVE-2019-8681 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8684/</URL>
      <Description>SUSE CVE CVE-2019-8684 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8686/</URL>
      <Description>SUSE CVE CVE-2019-8686 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8687/</URL>
      <Description>SUSE CVE CVE-2019-8687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8688/</URL>
      <Description>SUSE CVE CVE-2019-8688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8689/</URL>
      <Description>SUSE CVE CVE-2019-8689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8690/</URL>
      <Description>SUSE CVE CVE-2019-8690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8707/</URL>
      <Description>SUSE CVE CVE-2019-8707 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8710/</URL>
      <Description>SUSE CVE CVE-2019-8710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8719/</URL>
      <Description>SUSE CVE CVE-2019-8719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8720/</URL>
      <Description>SUSE CVE CVE-2019-8720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8726/</URL>
      <Description>SUSE CVE CVE-2019-8726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8733/</URL>
      <Description>SUSE CVE CVE-2019-8733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8735/</URL>
      <Description>SUSE CVE CVE-2019-8735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8743/</URL>
      <Description>SUSE CVE CVE-2019-8743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8763/</URL>
      <Description>SUSE CVE CVE-2019-8763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8764/</URL>
      <Description>SUSE CVE CVE-2019-8764 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8765/</URL>
      <Description>SUSE CVE CVE-2019-8765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8766/</URL>
      <Description>SUSE CVE CVE-2019-8766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8768/</URL>
      <Description>SUSE CVE CVE-2019-8768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8769/</URL>
      <Description>SUSE CVE CVE-2019-8769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8771/</URL>
      <Description>SUSE CVE CVE-2019-8771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8782/</URL>
      <Description>SUSE CVE CVE-2019-8782 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8783/</URL>
      <Description>SUSE CVE CVE-2019-8783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8808/</URL>
      <Description>SUSE CVE CVE-2019-8808 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8811/</URL>
      <Description>SUSE CVE CVE-2019-8811 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8812/</URL>
      <Description>SUSE CVE CVE-2019-8812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8813/</URL>
      <Description>SUSE CVE CVE-2019-8813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8814/</URL>
      <Description>SUSE CVE CVE-2019-8814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8815/</URL>
      <Description>SUSE CVE CVE-2019-8815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8816/</URL>
      <Description>SUSE CVE CVE-2019-8816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8819/</URL>
      <Description>SUSE CVE CVE-2019-8819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8820/</URL>
      <Description>SUSE CVE CVE-2019-8820 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8821/</URL>
      <Description>SUSE CVE CVE-2019-8821 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8822/</URL>
      <Description>SUSE CVE CVE-2019-8822 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8823/</URL>
      <Description>SUSE CVE CVE-2019-8823 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1">libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1">libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1">libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1">libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.26.2-lp150.2.28.1">libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1">typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1">typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1">typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="webkit-jsc-4-2.26.2-lp150.2.28.1">webkit-jsc-4-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1">webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.26.2-lp150.2.28.1">webkit2gtk3-devel-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1">webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1">libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1">libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1">libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1">libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1">libwebkit2gtk3-lang-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1">typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1">typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1">typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1">webkit-jsc-4-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1">webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1">webkit2gtk3-devel-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1">webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8551.html</URL>
        <Description>CVE-2019-8551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8558.html</URL>
        <Description>CVE-2019-8558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8559.html</URL>
        <Description>CVE-2019-8559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8563.html</URL>
        <Description>CVE-2019-8563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8625.html</URL>
        <Description>CVE-2019-8625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in iOS 13, Safari 13. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8674.html</URL>
        <Description>CVE-2019-8674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8681.html</URL>
        <Description>CVE-2019-8681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8684.html</URL>
        <Description>CVE-2019-8684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8686.html</URL>
        <Description>CVE-2019-8686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8687.html</URL>
        <Description>CVE-2019-8687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8688.html</URL>
        <Description>CVE-2019-8688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8689.html</URL>
        <Description>CVE-2019-8689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8690.html</URL>
        <Description>CVE-2019-8690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148931</URL>
        <Description>SUSE Bug 1148931</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8707</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8707.html</URL>
        <Description>CVE-2019-8707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8710.html</URL>
        <Description>CVE-2019-8710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8719.html</URL>
        <Description>CVE-2019-8719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.</Note>
    </Notes>
    <CVE>CVE-2019-8720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8720.html</URL>
        <Description>CVE-2019-8720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8726.html</URL>
        <Description>CVE-2019-8726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8733.html</URL>
        <Description>CVE-2019-8733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8735.html</URL>
        <Description>CVE-2019-8735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8743.html</URL>
        <Description>CVE-2019-8743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.1 and iPadOS 13.1, tvOS 13, Safari 13.0.1, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8763.html</URL>
        <Description>CVE-2019-8763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8764.html</URL>
        <Description>CVE-2019-8764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8765.html</URL>
        <Description>CVE-2019-8765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8766.html</URL>
        <Description>CVE-2019-8766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">"Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items.</Note>
    </Notes>
    <CVE>CVE-2019-8768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8768.html</URL>
        <Description>CVE-2019-8768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history.</Note>
    </Notes>
    <CVE>CVE-2019-8769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8769.html</URL>
        <Description>CVE-2019-8769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.</Note>
    </Notes>
    <CVE>CVE-2019-8771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8771.html</URL>
        <Description>CVE-2019-8771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155321</URL>
        <Description>SUSE Bug 1155321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8782.html</URL>
        <Description>CVE-2019-8782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8783.html</URL>
        <Description>CVE-2019-8783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8808.html</URL>
        <Description>CVE-2019-8808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8811.html</URL>
        <Description>CVE-2019-8811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8812.html</URL>
        <Description>CVE-2019-8812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8813.html</URL>
        <Description>CVE-2019-8813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8814.html</URL>
        <Description>CVE-2019-8814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8815.html</URL>
        <Description>CVE-2019-8815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8816.html</URL>
        <Description>CVE-2019-8816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8819.html</URL>
        <Description>CVE-2019-8819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8820</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8820.html</URL>
        <Description>CVE-2019-8820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8821</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8821.html</URL>
        <Description>CVE-2019-8821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8822.html</URL>
        <Description>CVE-2019-8822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.26.2-lp150.2.28.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.26.2-lp150.2.28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8823.html</URL>
        <Description>CVE-2019-8823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1156318</URL>
        <Description>SUSE Bug 1156318</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
