<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkitgtk</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0915-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-03-30T14:47:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-03-30T14:47:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-03-30T14:47:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkitgtk</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for webkitgtk fixes the following issues:

- webkitgtk was updated to version 2.4.10 (boo#971460):
  + Fix rendering of form controls and scrollbars with
    GTK+ &gt;= 3.19.
  + Fix crashes on PPC64.
  + Fix the build on powerpc 32 bits.
  + Add ARM64 build support.
  + Security fixes: CVE-2015-1120, CVE-2015-1076, CVE-2015-1071,
    CVE-2015-1081, CVE-2015-1122, CVE-2015-1155, CVE-2014-1748,
    CVE-2015-3752, CVE-2015-5809, CVE-2015-5928, CVE-2015-3749,
    CVE-2015-3659, CVE-2015-3748, CVE-2015-3743, CVE-2015-3731,
    CVE-2015-3745, CVE-2015-5822, CVE-2015-3658, CVE-2015-3741,
    CVE-2015-3727, CVE-2015-5801, CVE-2015-5788, CVE-2015-3747,
    CVE-2015-5794, CVE-2015-1127, CVE-2015-1153, CVE-2015-1083.
  + Updated translations.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0915-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-1_0-0-2.4.10-7.2">
      <FullProductName ProductID="libjavascriptcoregtk-1_0-0-2.4.10-7.2">libjavascriptcoregtk-1_0-0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2">
      <FullProductName ProductID="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2">libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-3_0-0-2.4.10-7.2">
      <FullProductName ProductID="libjavascriptcoregtk-3_0-0-2.4.10-7.2">libjavascriptcoregtk-3_0-0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2">
      <FullProductName ProductID="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2">libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-1_0-0-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk-1_0-0-2.4.10-7.2">libwebkitgtk-1_0-0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-1_0-0-32bit-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk-1_0-0-32bit-2.4.10-7.2">libwebkitgtk-1_0-0-32bit-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-3_0-0-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk-3_0-0-2.4.10-7.2">libwebkitgtk-3_0-0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-3_0-0-32bit-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk-3_0-0-32bit-2.4.10-7.2">libwebkitgtk-3_0-0-32bit-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-devel-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk-devel-2.4.10-7.2">libwebkitgtk-devel-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk2-lang-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk2-lang-2.4.10-7.2">libwebkitgtk2-lang-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk3-devel-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk3-devel-2.4.10-7.2">libwebkitgtk3-devel-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk3-lang-2.4.10-7.2">
      <FullProductName ProductID="libwebkitgtk3-lang-2.4.10-7.2">libwebkitgtk3-lang-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2">typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2">typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit-1_0-2.4.10-7.2">
      <FullProductName ProductID="typelib-1_0-WebKit-1_0-2.4.10-7.2">typelib-1_0-WebKit-1_0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit-3_0-2.4.10-7.2">
      <FullProductName ProductID="typelib-1_0-WebKit-3_0-2.4.10-7.2">typelib-1_0-WebKit-3_0-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-1-2.4.10-7.2">
      <FullProductName ProductID="webkit-jsc-1-2.4.10-7.2">webkit-jsc-1-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-3-2.4.10-7.2">
      <FullProductName ProductID="webkit-jsc-3-2.4.10-7.2">webkit-jsc-3-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkitgtk-2.4.10-7.2">
      <FullProductName ProductID="webkitgtk-2.4.10-7.2">webkitgtk-2.4.10-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkitgtk3-2.4.10-7.2">
      <FullProductName ProductID="webkitgtk3-2.4.10-7.2">webkitgtk3-2.4.10-7.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-1_0-0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2">libjavascriptcoregtk-1_0-0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2">libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-3_0-0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2">libjavascriptcoregtk-3_0-0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2">libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-1_0-0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2">libwebkitgtk-1_0-0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-1_0-0-32bit-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2">libwebkitgtk-1_0-0-32bit-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-3_0-0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2">libwebkitgtk-3_0-0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-3_0-0-32bit-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2">libwebkitgtk-3_0-0-32bit-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk-devel-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2">libwebkitgtk-devel-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk2-lang-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2">libwebkitgtk2-lang-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk3-devel-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2">libwebkitgtk3-devel-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkitgtk3-lang-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2">libwebkitgtk3-lang-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2">typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2">typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit-1_0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2">typelib-1_0-WebKit-1_0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit-3_0-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2">typelib-1_0-WebKit-3_0-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-1-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2">webkit-jsc-1-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-3-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2">webkit-jsc-3-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkitgtk-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:webkitgtk-2.4.10-7.2">webkitgtk-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkitgtk3-2.4.10-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2">webkitgtk3-2.4.10-7.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.</Note>
    </Notes>
    <CVE>CVE-2014-1748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1748.html</URL>
        <Description>CVE-2014-1748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909707</URL>
        <Description>SUSE Bug 909707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1071.html</URL>
        <Description>CVE-2015-1071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1076.html</URL>
        <Description>CVE-2015-1076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1081.html</URL>
        <Description>CVE-2015-1081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.</Note>
    </Notes>
    <CVE>CVE-2015-1083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1083.html</URL>
        <Description>CVE-2015-1083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/923223</URL>
        <Description>SUSE Bug 923223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.</Note>
    </Notes>
    <CVE>CVE-2015-1120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1120.html</URL>
        <Description>CVE-2015-1120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928380</URL>
        <Description>SUSE Bug 928380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.</Note>
    </Notes>
    <CVE>CVE-2015-1122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1122.html</URL>
        <Description>CVE-2015-1122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082221</URL>
        <Description>SUSE Bug 1082221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928380</URL>
        <Description>SUSE Bug 928380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.</Note>
    </Notes>
    <CVE>CVE-2015-1127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1127.html</URL>
        <Description>CVE-2015-1127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928380</URL>
        <Description>SUSE Bug 928380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.</Note>
    </Notes>
    <CVE>CVE-2015-1153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1153.html</URL>
        <Description>CVE-2015-1153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-1155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1155.html</URL>
        <Description>CVE-2015-1155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082221</URL>
        <Description>SUSE Bug 1082221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-3658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3658.html</URL>
        <Description>CVE-2015-3658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-3659</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3659.html</URL>
        <Description>CVE-2015-3659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936835</URL>
        <Description>SUSE Bug 936835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936836</URL>
        <Description>SUSE Bug 936836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-3727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3727.html</URL>
        <Description>CVE-2015-3727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3731.html</URL>
        <Description>CVE-2015-3731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3741</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3741.html</URL>
        <Description>CVE-2015-3741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3743.html</URL>
        <Description>CVE-2015-3743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3745.html</URL>
        <Description>CVE-2015-3745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3747</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3747.html</URL>
        <Description>CVE-2015-3747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3748.html</URL>
        <Description>CVE-2015-3748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.</Note>
    </Notes>
    <CVE>CVE-2015-3749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3749.html</URL>
        <Description>CVE-2015-3749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.</Note>
    </Notes>
    <CVE>CVE-2015-3752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3752.html</URL>
        <Description>CVE-2015-3752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element.</Note>
    </Notes>
    <CVE>CVE-2015-5788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5788.html</URL>
        <Description>CVE-2015-5788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5794.html</URL>
        <Description>CVE-2015-5794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5801.html</URL>
        <Description>CVE-2015-5801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5809.html</URL>
        <Description>CVE-2015-5809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.</Note>
    </Notes>
    <CVE>CVE-2015-5822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5822.html</URL>
        <Description>CVE-2015-5822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.</Note>
    </Notes>
    <CVE>CVE-2015-5928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libjavascriptcoregtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-1_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-3_0-0-32bit-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk2-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-devel-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libwebkitgtk3-lang-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-JavaScriptCore-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-1_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:typelib-1_0-WebKit-3_0-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-1-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkit-jsc-3-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk-2.4.10-7.2</ProductID>
        <ProductID>openSUSE Leap 42.1:webkitgtk3-2.4.10-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5928.html</URL>
        <Description>CVE-2015-5928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971460</URL>
        <Description>SUSE Bug 971460</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
