opensuse-su-2025-20065-1
Vulnerability from csaf_opensuse
Published
2025-11-19 16:45
Modified
2025-11-19 16:45
Summary
Security update for MozillaFirefox

Notes

Title of the patch
Security update for MozillaFirefox
Description of the patch
This update for MozillaFirefox fixes the following issues: Changes in MozillaFirefox: Firefox Extended Support Release 140.5.0 ESR: * Fixed: Various security fixes (MFSA 2025-88 bsc#1253188): * CVE-2025-13012 Race condition in the Graphics component * CVE-2025-13016 Incorrect boundary conditions in the JavaScript: WebAssembly component * CVE-2025-13017 Same-origin policy bypass in the DOM: Notifications component * CVE-2025-13018 Mitigation bypass in the DOM: Security component * CVE-2025-13019 Same-origin policy bypass in the DOM: Workers component * CVE-2025-13013 Mitigation bypass in the DOM: Core & HTML component * CVE-2025-13020 Use-after-free in the WebRTC: Audio/Video component * CVE-2025-13014 Use-after-free in the Audio/Video component * CVE-2025-13015 Spoofing issue in Firefox - Firefox Extended Support Release 140.4.0 ESR * Fixed: Various security fixes. MFSA 2025-83 (bsc#1251263) * CVE-2025-11708 Use-after-free in MediaTrackGraphImpl::GetInstance() * CVE-2025-11709 Out of bounds read/write in a privileged process triggered by WebGL textures * CVE-2025-11710 Cross-process information leaked due to malicious IPC messages * CVE-2025-11711 Some non-writable Object properties could be modified * CVE-2025-11712 An OBJECT tag type attribute overrode browser behavior on web resources without a content-type * CVE-2025-11713 Potential user-assisted code execution in “Copy as cURL” command * CVE-2025-11714 Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 * CVE-2025-11715 Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 - Firefox Extended Support Release 140.3.1 ESR (bsc#1250452) * Fixed: Improved reliability when HTTP/3 connections fail: Firefox no longer forces HTTP/2 during fallback, allowing the server to choose the protocol and preventing stalls on some sites. Firefox Extended Support Release 140.3.0 ESR * Fixed: Various security fixes (MFSA 2025-75 bsc#1249391) * CVE-2025-10527 Sandbox escape due to use-after-free in the Graphics: Canvas2D component * CVE-2025-10528 Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component * CVE-2025-10529 Same-origin policy bypass in the Layout component * CVE-2025-10532 Incorrect boundary conditions in the JavaScript: GC component * CVE-2025-10533 Integer overflow in the SVG component * CVE-2025-10536 Information disclosure in the Networking: Cache component * CVE-2025-10537 Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143
Patchnames
openSUSE-Leap-16.0-39
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for MozillaFirefox",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for MozillaFirefox fixes the following issues:\n\nChanges in MozillaFirefox:\n\nFirefox Extended Support Release 140.5.0 ESR:\n\n* Fixed: Various security fixes (MFSA 2025-88 bsc#1253188):\n\n  * CVE-2025-13012\n    Race condition in the Graphics component\n  * CVE-2025-13016\n    Incorrect boundary conditions in the JavaScript: WebAssembly\n    component\n  * CVE-2025-13017\n    Same-origin policy bypass in the DOM: Notifications component\n  * CVE-2025-13018\n    Mitigation bypass in the DOM: Security component\n  * CVE-2025-13019\n    Same-origin policy bypass in the DOM: Workers component\n  * CVE-2025-13013\n    Mitigation bypass in the DOM: Core \u0026 HTML component\n  * CVE-2025-13020\n    Use-after-free in the WebRTC: Audio/Video component\n  * CVE-2025-13014\n    Use-after-free in the Audio/Video component\n  * CVE-2025-13015\n    Spoofing issue in Firefox\n\n- Firefox Extended Support Release 140.4.0 ESR\n  * Fixed: Various security fixes.\n  MFSA 2025-83 (bsc#1251263)\n  * CVE-2025-11708\n    Use-after-free in MediaTrackGraphImpl::GetInstance()\n  * CVE-2025-11709\n    Out of bounds read/write in a privileged process triggered by\n    WebGL textures\n  * CVE-2025-11710\n    Cross-process information leaked due to malicious IPC\n    messages\n  * CVE-2025-11711\n    Some non-writable Object properties could be modified\n  * CVE-2025-11712\n    An OBJECT tag type attribute overrode browser behavior on web\n    resources without a content-type\n  * CVE-2025-11713\n    Potential user-assisted code execution in \u201cCopy as cURL\u201d\n    command\n  * CVE-2025-11714\n    Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR\n    140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144\n  * CVE-2025-11715\n    Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird\n    ESR 140.4, Firefox 144 and Thunderbird 144\n\n- Firefox Extended Support Release 140.3.1 ESR (bsc#1250452)\n  * Fixed: Improved reliability when HTTP/3 connections fail:\n    Firefox no longer forces HTTP/2 during fallback, allowing the\n    server to choose the protocol and preventing stalls on some\n    sites.\n\nFirefox Extended Support Release 140.3.0 ESR\n\n* Fixed: Various security fixes (MFSA 2025-75 bsc#1249391)\n\n  * CVE-2025-10527\n    Sandbox escape due to use-after-free in the Graphics:\n    Canvas2D component\n  * CVE-2025-10528\n    Sandbox escape due to undefined behavior, invalid pointer in\n    the Graphics: Canvas2D component\n  * CVE-2025-10529\n    Same-origin policy bypass in the Layout component\n  * CVE-2025-10532\n    Incorrect boundary conditions in the JavaScript: GC component\n  * CVE-2025-10533\n    Integer overflow in the SVG component\n  * CVE-2025-10536\n    Information disclosure in the Networking: Cache component\n  * CVE-2025-10537\n    Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird\n    ESR 140.3, Firefox 143 and Thunderbird 143\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Leap-16.0-39",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025-20065-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1249391",
        "url": "https://bugzilla.suse.com/1249391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250452",
        "url": "https://bugzilla.suse.com/1250452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251263",
        "url": "https://bugzilla.suse.com/1251263"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253188",
        "url": "https://bugzilla.suse.com/1253188"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10527 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10528 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10528/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10529 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10529/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10532 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10533 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10536 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10536/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-10537 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-10537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11708 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11709 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11709/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11710 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11711 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11711/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11712 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11712/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11713 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11713/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11714 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11714/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-11715 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-11715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13012 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13013 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13013/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13014 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13015 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13016 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13017 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13017/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13018 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13018/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13019 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13020 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13020/"
      }
    ],
    "title": "Security update for MozillaFirefox",
    "tracking": {
      "current_release_date": "2025-11-19T16:45:48Z",
      "generator": {
        "date": "2025-11-19T16:45:48Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2025-20065-1",
      "initial_release_date": "2025-11-19T16:45:48Z",
      "revision_history": [
        {
          "date": "2025-11-19T16:45:48Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "MozillaFirefox-140.5.0-160000.1.1.aarch64",
                "product": {
                  "name": "MozillaFirefox-140.5.0-160000.1.1.aarch64",
                  "product_id": "MozillaFirefox-140.5.0-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
                "product": {
                  "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
                  "product_id": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
                "product": {
                  "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
                  "product_id": "MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
                "product": {
                  "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
                  "product_id": "MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
                "product": {
                  "name": "MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
                  "product_id": "MozillaFirefox-devel-140.5.0-160000.1.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "MozillaFirefox-140.5.0-160000.1.1.ppc64le",
                "product": {
                  "name": "MozillaFirefox-140.5.0-160000.1.1.ppc64le",
                  "product_id": "MozillaFirefox-140.5.0-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
                "product": {
                  "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
                  "product_id": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
                "product": {
                  "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
                  "product_id": "MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
                "product": {
                  "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
                  "product_id": "MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "MozillaFirefox-140.5.0-160000.1.1.s390x",
                "product": {
                  "name": "MozillaFirefox-140.5.0-160000.1.1.s390x",
                  "product_id": "MozillaFirefox-140.5.0-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
                "product": {
                  "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
                  "product_id": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
                "product": {
                  "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
                  "product_id": "MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
                "product": {
                  "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
                  "product_id": "MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "MozillaFirefox-140.5.0-160000.1.1.x86_64",
                "product": {
                  "name": "MozillaFirefox-140.5.0-160000.1.1.x86_64",
                  "product_id": "MozillaFirefox-140.5.0-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
                "product": {
                  "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
                  "product_id": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
                "product": {
                  "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
                  "product_id": "MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64",
                "product": {
                  "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64",
                  "product_id": "MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 16.0",
                "product": {
                  "name": "openSUSE Leap 16.0",
                  "product_id": "openSUSE Leap 16.0"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-140.5.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64"
        },
        "product_reference": "MozillaFirefox-140.5.0-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-140.5.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le"
        },
        "product_reference": "MozillaFirefox-140.5.0-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-140.5.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x"
        },
        "product_reference": "MozillaFirefox-140.5.0-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-140.5.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64"
        },
        "product_reference": "MozillaFirefox-140.5.0-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64"
        },
        "product_reference": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le"
        },
        "product_reference": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x"
        },
        "product_reference": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64"
        },
        "product_reference": "MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-devel-140.5.0-160000.1.1.noarch as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch"
        },
        "product_reference": "MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64"
        },
        "product_reference": "MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le"
        },
        "product_reference": "MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x"
        },
        "product_reference": "MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64"
        },
        "product_reference": "MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64"
        },
        "product_reference": "MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le"
        },
        "product_reference": "MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x"
        },
        "product_reference": "MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        },
        "product_reference": "MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-10527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10527",
          "url": "https://www.suse.com/security/cve/CVE-2025-10527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10527",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10527"
    },
    {
      "cve": "CVE-2025-10528",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10528"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10528",
          "url": "https://www.suse.com/security/cve/CVE-2025-10528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10528",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10528"
    },
    {
      "cve": "CVE-2025-10529",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10529"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Same-origin policy bypass in the Layout component. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10529",
          "url": "https://www.suse.com/security/cve/CVE-2025-10529"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10529",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10529"
    },
    {
      "cve": "CVE-2025-10532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect boundary conditions in the JavaScript: GC component. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10532",
          "url": "https://www.suse.com/security/cve/CVE-2025-10532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10532",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10532"
    },
    {
      "cve": "CVE-2025-10533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in the SVG component. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 115.28, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10533",
          "url": "https://www.suse.com/security/cve/CVE-2025-10533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10533",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10533"
    },
    {
      "cve": "CVE-2025-10536",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10536"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Information disclosure in the Networking: Cache component. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10536",
          "url": "https://www.suse.com/security/cve/CVE-2025-10536"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10536",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10536"
    },
    {
      "cve": "CVE-2025-10537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-10537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 143, Firefox ESR \u003c 140.3, Thunderbird \u003c 143, and Thunderbird \u003c 140.3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-10537",
          "url": "https://www.suse.com/security/cve/CVE-2025-10537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249391 for CVE-2025-10537",
          "url": "https://bugzilla.suse.com/1249391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-10537"
    },
    {
      "cve": "CVE-2025-11708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free in MediaTrackGraphImpl::GetInstance() This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11708",
          "url": "https://www.suse.com/security/cve/CVE-2025-11708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11708",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11708"
    },
    {
      "cve": "CVE-2025-11709",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11709"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 115.29, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11709",
          "url": "https://www.suse.com/security/cve/CVE-2025-11709"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11709",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11709"
    },
    {
      "cve": "CVE-2025-11710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 115.29, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11710",
          "url": "https://www.suse.com/security/cve/CVE-2025-11710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11710",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11710"
    },
    {
      "cve": "CVE-2025-11711",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11711"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 115.29, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11711",
          "url": "https://www.suse.com/security/cve/CVE-2025-11711"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11711",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11711"
    },
    {
      "cve": "CVE-2025-11712",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11712"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11712",
          "url": "https://www.suse.com/security/cve/CVE-2025-11712"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11712",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11712"
    },
    {
      "cve": "CVE-2025-11713",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11713"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient escaping in the \"Copy as cURL\" feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11713",
          "url": "https://www.suse.com/security/cve/CVE-2025-11713"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11713",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11713"
    },
    {
      "cve": "CVE-2025-11714",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11714"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 115.29, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11714",
          "url": "https://www.suse.com/security/cve/CVE-2025-11714"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11714",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11714"
    },
    {
      "cve": "CVE-2025-11715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-11715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 144, Firefox ESR \u003c 140.4, Thunderbird \u003c 144, and Thunderbird \u003c 140.4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-11715",
          "url": "https://www.suse.com/security/cve/CVE-2025-11715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251263 for CVE-2025-11715",
          "url": "https://bugzilla.suse.com/1251263"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2025-11715"
    },
    {
      "cve": "CVE-2025-13012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the Graphics component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Firefox ESR \u003c 115.30, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13012",
          "url": "https://www.suse.com/security/cve/CVE-2025-13012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13012",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13012"
    },
    {
      "cve": "CVE-2025-13013",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13013"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mitigation bypass in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Firefox ESR \u003c 115.30, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13013",
          "url": "https://www.suse.com/security/cve/CVE-2025-13013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13013",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13013"
    },
    {
      "cve": "CVE-2025-13014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free in the Audio/Video component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Firefox ESR \u003c 115.30, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13014",
          "url": "https://www.suse.com/security/cve/CVE-2025-13014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13014",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13014"
    },
    {
      "cve": "CVE-2025-13015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Spoofing issue in Firefox. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Firefox ESR \u003c 115.30, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13015",
          "url": "https://www.suse.com/security/cve/CVE-2025-13015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13015",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13015"
    },
    {
      "cve": "CVE-2025-13016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13016",
          "url": "https://www.suse.com/security/cve/CVE-2025-13016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13016",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13016"
    },
    {
      "cve": "CVE-2025-13017",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13017"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13017",
          "url": "https://www.suse.com/security/cve/CVE-2025-13017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13017",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13017"
    },
    {
      "cve": "CVE-2025-13018",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13018"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13018",
          "url": "https://www.suse.com/security/cve/CVE-2025-13018"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13018",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13018"
    },
    {
      "cve": "CVE-2025-13019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13019",
          "url": "https://www.suse.com/security/cve/CVE-2025-13019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13019",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13019"
    },
    {
      "cve": "CVE-2025-13020",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13020"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox \u003c 145, Firefox ESR \u003c 140.5, Thunderbird \u003c 145, and Thunderbird \u003c 140.5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
          "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13020",
          "url": "https://www.suse.com/security/cve/CVE-2025-13020"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253188 for CVE-2025-13020",
          "url": "https://bugzilla.suse.com/1253188"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-branding-upstream-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-devel-140.5.0-160000.1.1.noarch",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-common-140.5.0-160000.1.1.x86_64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.aarch64",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.s390x",
            "openSUSE Leap 16.0:MozillaFirefox-translations-other-140.5.0-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-11-19T16:45:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-13020"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…