opensuse-su-2024:10590-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
seamonkey-2.53.9.1-1.1 on GA media

Notes

Title of the patch
seamonkey-2.53.9.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the seamonkey-2.53.9.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10590
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "seamonkey-2.53.9.1-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the seamonkey-2.53.9.1-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-10590",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10590-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2007-4879 page",
        "url": "https://www.suse.com/security/cve/CVE-2007-4879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0412 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0412/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0414 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0414/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0415 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0415/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0418 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0418/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0419 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0419/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0592 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0592/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-0593 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-0593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-1195 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-1195/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-1233 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-1233/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-1236 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-1236/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-1238 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-1238/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2008-1241 page",
        "url": "https://www.suse.com/security/cve/CVE-2008-1241/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12359 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12359/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12360 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12360/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12362 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12363 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12363/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12364 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12364/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12365 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12365/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12366 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12366/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5156 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5188 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5188/"
      }
    ],
    "title": "seamonkey-2.53.9.1-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:10590-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "seamonkey-2.53.9.1-1.1.aarch64",
                "product": {
                  "name": "seamonkey-2.53.9.1-1.1.aarch64",
                  "product_id": "seamonkey-2.53.9.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
                "product": {
                  "name": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
                  "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-irc-2.53.9.1-1.1.aarch64",
                "product": {
                  "name": "seamonkey-irc-2.53.9.1-1.1.aarch64",
                  "product_id": "seamonkey-irc-2.53.9.1-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "seamonkey-2.53.9.1-1.1.ppc64le",
                "product": {
                  "name": "seamonkey-2.53.9.1-1.1.ppc64le",
                  "product_id": "seamonkey-2.53.9.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
                "product": {
                  "name": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
                  "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-irc-2.53.9.1-1.1.ppc64le",
                "product": {
                  "name": "seamonkey-irc-2.53.9.1-1.1.ppc64le",
                  "product_id": "seamonkey-irc-2.53.9.1-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "seamonkey-2.53.9.1-1.1.s390x",
                "product": {
                  "name": "seamonkey-2.53.9.1-1.1.s390x",
                  "product_id": "seamonkey-2.53.9.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
                "product": {
                  "name": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
                  "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-irc-2.53.9.1-1.1.s390x",
                "product": {
                  "name": "seamonkey-irc-2.53.9.1-1.1.s390x",
                  "product_id": "seamonkey-irc-2.53.9.1-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "seamonkey-2.53.9.1-1.1.x86_64",
                "product": {
                  "name": "seamonkey-2.53.9.1-1.1.x86_64",
                  "product_id": "seamonkey-2.53.9.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
                "product": {
                  "name": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
                  "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "seamonkey-irc-2.53.9.1-1.1.x86_64",
                "product": {
                  "name": "seamonkey-irc-2.53.9.1-1.1.x86_64",
                  "product_id": "seamonkey-irc-2.53.9.1-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.9.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64"
        },
        "product_reference": "seamonkey-2.53.9.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.9.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le"
        },
        "product_reference": "seamonkey-2.53.9.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.9.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x"
        },
        "product_reference": "seamonkey-2.53.9.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-2.53.9.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64"
        },
        "product_reference": "seamonkey-2.53.9.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64"
        },
        "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.9.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64"
        },
        "product_reference": "seamonkey-irc-2.53.9.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.9.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le"
        },
        "product_reference": "seamonkey-irc-2.53.9.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.9.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x"
        },
        "product_reference": "seamonkey-irc-2.53.9.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "seamonkey-irc-2.53.9.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        },
        "product_reference": "seamonkey-irc-2.53.9.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2007-4879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2007-4879",
          "url": "https://www.suse.com/security/cve/CVE-2007-4879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 370353 for CVE-2007-4879",
          "url": "https://bugzilla.suse.com/370353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2007-4879"
    },
    {
      "cve": "CVE-2008-0412",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0412"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0412",
          "url": "https://www.suse.com/security/cve/CVE-2008-0412"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0412",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2008-0412"
    },
    {
      "cve": "CVE-2008-0414",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0414"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka \"focus spoofing.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0414",
          "url": "https://www.suse.com/security/cve/CVE-2008-0414"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0414",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-0414"
    },
    {
      "cve": "CVE-2008-0415",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0415"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka \"JavaScript privilege escalation bugs.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0415",
          "url": "https://www.suse.com/security/cve/CVE-2008-0415"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0415",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-0415"
    },
    {
      "cve": "CVE-2008-0418",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0418"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using \"flat\" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0418",
          "url": "https://www.suse.com/security/cve/CVE-2008-0418"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0418",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-0418"
    },
    {
      "cve": "CVE-2008-0419",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0419"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0419",
          "url": "https://www.suse.com/security/cve/CVE-2008-0419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0419",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2008-0419"
    },
    {
      "cve": "CVE-2008-0592",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0592"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a \"Content-Disposition: attachment\" and an invalid \"Content-Type: plain/text,\" which prevents Firefox from rendering future plain text files within the browser.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0592",
          "url": "https://www.suse.com/security/cve/CVE-2008-0592"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0592",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-0592"
    },
    {
      "cve": "CVE-2008-0593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-0593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-0593",
          "url": "https://www.suse.com/security/cve/CVE-2008-0593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 354469 for CVE-2008-0593",
          "url": "https://bugzilla.suse.com/354469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-0593"
    },
    {
      "cve": "CVE-2008-1195",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-1195"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-1195",
          "url": "https://www.suse.com/security/cve/CVE-2008-1195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 368134 for CVE-2008-1195",
          "url": "https://bugzilla.suse.com/368134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 370353 for CVE-2008-1195",
          "url": "https://bugzilla.suse.com/370353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 379038 for CVE-2008-1195",
          "url": "https://bugzilla.suse.com/379038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 404983 for CVE-2008-1195",
          "url": "https://bugzilla.suse.com/404983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2008-1195"
    },
    {
      "cve": "CVE-2008-1233",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-1233"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via \"XPCNativeWrapper pollution.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-1233",
          "url": "https://www.suse.com/security/cve/CVE-2008-1233"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 370353 for CVE-2008-1233",
          "url": "https://bugzilla.suse.com/370353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-1233"
    },
    {
      "cve": "CVE-2008-1236",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-1236"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-1236",
          "url": "https://www.suse.com/security/cve/CVE-2008-1236"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 370353 for CVE-2008-1236",
          "url": "https://bugzilla.suse.com/370353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-1236"
    },
    {
      "cve": "CVE-2008-1238",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-1238"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-1238",
          "url": "https://www.suse.com/security/cve/CVE-2008-1238"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 370353 for CVE-2008-1238",
          "url": "https://bugzilla.suse.com/370353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-1238"
    },
    {
      "cve": "CVE-2008-1241",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2008-1241"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2008-1241",
          "url": "https://www.suse.com/security/cve/CVE-2008-1241"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 370353 for CVE-2008-1241",
          "url": "https://bugzilla.suse.com/370353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2008-1241"
    },
    {
      "cve": "CVE-2018-12359",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12359"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12359",
          "url": "https://www.suse.com/security/cve/CVE-2018-12359"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12359",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12359"
    },
    {
      "cve": "CVE-2018-12360",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12360"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12360",
          "url": "https://www.suse.com/security/cve/CVE-2018-12360"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12360",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12360"
    },
    {
      "cve": "CVE-2018-12362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12362",
          "url": "https://www.suse.com/security/cve/CVE-2018-12362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12362",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12362"
    },
    {
      "cve": "CVE-2018-12363",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12363"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12363",
          "url": "https://www.suse.com/security/cve/CVE-2018-12363"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12363",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12363"
    },
    {
      "cve": "CVE-2018-12364",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12364"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12364",
          "url": "https://www.suse.com/security/cve/CVE-2018-12364"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12364",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12364"
    },
    {
      "cve": "CVE-2018-12365",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12365"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12365",
          "url": "https://www.suse.com/security/cve/CVE-2018-12365"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12365",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12365"
    },
    {
      "cve": "CVE-2018-12366",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12366"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12366",
          "url": "https://www.suse.com/security/cve/CVE-2018-12366"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-12366",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12366"
    },
    {
      "cve": "CVE-2018-5156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5156",
          "url": "https://www.suse.com/security/cve/CVE-2018-5156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-5156",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-5156"
    },
    {
      "cve": "CVE-2018-5188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
          "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5188",
          "url": "https://www.suse.com/security/cve/CVE-2018-5188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098998 for CVE-2018-5188",
          "url": "https://bugzilla.suse.com/1098998"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x",
            "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-5188"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…