<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2014-10-29T05:00:59</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20081391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1391</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2008-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" source="CVE"/>
	<description>
	Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
	</description>
 </metadata>
<!-- cbbfc77344a13615f40bc3e63eae3c18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
	<description>
	The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1570</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570" source="CVE"/>
	<description>
	Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b84657f72c7c2df373001c1b38ef9340 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059839" comment="gimp-branding-upstream less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059682" comment="gimp-lang less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059684" comment="gimp less than 2.6.2-3.28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
	<description>
	Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20b9ea7a4834987ee4c584eba1c24aef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- 8c866e8f9943358301948271844ac817 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
	<description>
	XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- 11d1c2d3e071fc753ee5b45452c55e3f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060327" comment="libpython2_6-1_0 less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060331" comment="python-base less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060429" comment="python-devel less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060338" comment="python-xml less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060339" comment="python less than 2.6.0-8.9.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
	<description>
	libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
	</description>
 </metadata>
<!-- cb267afed4c3185919f967a9148fa820 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061093" comment="libvorbis less than 1.2.0-79.13.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
	<description>
	OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
	</description>
 </metadata>
<!-- 679e9cebe35497a8e104a4406e74ec97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059250" comment="libopenssl0_9_8 less than 0.9.8h-30.22.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059252" comment="openssl less than 0.9.8h-30.22.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a2e0cca8fba3f33a13cd450b1aa0bb15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059195" comment="cups-client less than 1.3.9-8.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059196" comment="cups-libs less than 1.3.9-8.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059197" comment="cups less than 1.3.9-8.34.1"/>
		</criteria>
	</criteria>
	<!-- aa10421de7243ad4978f953c0e7252c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059840" comment="cups-client less than 1.3.9-8.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059841" comment="cups-libs less than 1.3.9-8.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059842" comment="cups less than 1.3.9-8.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 4714ff25afd3083726e8916ce7d192d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065171" comment="gnutls less than 2.4.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065189" comment="libgnutls-extra26 less than 2.4.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065174" comment="libgnutls26 less than 2.4.1-24.32.1"/>
		</criteria>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- 61b310ce1cf079d2ff38811f1b2a61eb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059417" comment="libfreebl3 less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059421" comment="mozilla-nss less than 3.12.6-3.1.1"/>
		</criteria>
	</criteria>
	<!-- 679e9cebe35497a8e104a4406e74ec97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059250" comment="libopenssl0_9_8 less than 0.9.8h-30.22.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059252" comment="openssl less than 0.9.8h-30.22.21.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
	<description>
	The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
	</description>
 </metadata>
<!-- 11d1c2d3e071fc753ee5b45452c55e3f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060327" comment="libpython2_6-1_0 less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060331" comment="python-base less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060429" comment="python-devel less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060338" comment="python-xml less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060339" comment="python less than 2.6.0-8.9.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
<!-- 11d1c2d3e071fc753ee5b45452c55e3f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060327" comment="libpython2_6-1_0 less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060331" comment="python-base less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060429" comment="python-devel less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060338" comment="python-xml less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060339" comment="python less than 2.6.0-8.9.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3793</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory consumption) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3909</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909" source="CVE"/>
	<description>
	Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b84657f72c7c2df373001c1b38ef9340 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059839" comment="gimp-branding-upstream less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059682" comment="gimp-lang less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059684" comment="gimp less than 2.6.2-3.28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3988</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20b9ea7a4834987ee4c584eba1c24aef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- 8c866e8f9943358301948271844ac817 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4270</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270" source="CVE"/>
	<description>
	Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.
	</description>
 </metadata>
<!-- e9e3fb1b1de3729817a856d6929d6b28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4274</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" source="CVE"/>
	<description>
	Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
	</description>
 </metadata>
<!-- 66c03bc3acec475b09b766abf4c7597a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058588" comment="netpbm less than 10.26.44-101.9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4897</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897" source="CVE"/>
	<description>
	Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
	</description>
 </metadata>
<!-- e9e3fb1b1de3729817a856d6929d6b28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
	<description>
	Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
	</description>
 </metadata>
<!-- 228123734ed05fdf133a31b840b3f5eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0015</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015" source="CVE"/>
	<description>
	nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.
	</description>
 </metadata>
<!-- cbbfc77344a13615f40bc3e63eae3c18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20b9ea7a4834987ee4c584eba1c24aef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- 8c866e8f9943358301948271844ac817 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0160</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0160" source="CVE"/>
	<description>
	The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20b9ea7a4834987ee4c584eba1c24aef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- 8c866e8f9943358301948271844ac817 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20b9ea7a4834987ee4c584eba1c24aef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- 8c866e8f9943358301948271844ac817 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
	<description>
	The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1aeffe8ed66318572278a0b5de812b37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
	<!-- 580d0db128076aeaa1b9f15fe1f79deb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054877" comment="hunspell less than 1.2.7-1.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060657" comment="libmozhelper-1_0-0 less than 0.1.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060658" comment="moblin-internet-browser-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060659" comment="moblin-internet-browser less than 3.5.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 7e5689152d5f5898c44db7f993fc5dd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059482" comment="MozillaFirefox-translations less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059486" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsCycleCollector::MarkRoots function in Mozilla Firefox 3.5.x before 3.5.10 and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a crafted HTML document, related to an improper frame construction process for menus.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0186</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186" source="CVE"/>
	<description>
	Cross-domain vulnerability in Adobe Flash Player before 10.0.45.2, Adobe AIR before 1.5.3.9130, and Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows remote attackers to bypass intended sandbox restrictions and make cross-domain requests via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f98b0380c13b2c2a99d8610771b8792 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057994" comment="flash-player less than 10.0.45.2-0.1.1"/>
	</criteria>
	<!-- 1ca353bd1c37b71d9462c56e969e7e90 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058548" comment="acroread less than 9.3.1-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.45.2 and Adobe AIR before 1.5.3.9130 allow remote attackers to cause a denial of service (application crash) via a modified SWF file.
	</description>
 </metadata>
<!-- 0f98b0380c13b2c2a99d8610771b8792 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057994" comment="flash-player less than 10.0.45.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0188</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 1ca353bd1c37b71d9462c56e969e7e90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058548" comment="acroread less than 9.3.1-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0190</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0191</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0192</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0193 and CVE-2010-0196.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0193</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0196.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0194</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0197, CVE-2010-0201, and CVE-2010-0204.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0195</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, do not properly handle fonts, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0197</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0201, and CVE-2010-0204.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0198</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0199, CVE-2010-0202, and CVE-2010-0203.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0199</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0204.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0203.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0203</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0202.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0204</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0201.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205" source="CVE"/>
	<description>
	The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
	</description>
 </metadata>
<!-- e2f5b3e5568937a189c1b18f837ff52b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060316" comment="libpng12-0 less than 1.2.39-1.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2213, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
<!-- 3e6cf94a9285a46824dbeab3656597f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
	<description>
	slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
	</description>
 </metadata>
<!-- 228123734ed05fdf133a31b840b3f5eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0296</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" source="CVE"/>
	<description>
	The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
	</description>
 </metadata>
<!-- cbbfc77344a13615f40bc3e63eae3c18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0302</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a2e0cca8fba3f33a13cd450b1aa0bb15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059195" comment="cups-client less than 1.3.9-8.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059196" comment="cups-libs less than 1.3.9-8.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059197" comment="cups less than 1.3.9-8.34.1"/>
		</criteria>
	</criteria>
	<!-- aa10421de7243ad4978f953c0e7252c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059840" comment="cups-client less than 1.3.9-8.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059841" comment="cups-libs less than 1.3.9-8.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059842" comment="cups less than 1.3.9-8.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
	<description>
	The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a2e0cca8fba3f33a13cd450b1aa0bb15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059195" comment="cups-client less than 1.3.9-8.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059196" comment="cups-libs less than 1.3.9-8.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059197" comment="cups less than 1.3.9-8.34.1"/>
		</criteria>
	</criteria>
	<!-- aa10421de7243ad4978f953c0e7252c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059840" comment="cups-client less than 1.3.9-8.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059841" comment="cups-libs less than 1.3.9-8.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059842" comment="cups less than 1.3.9-8.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0395</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395" source="CVE"/>
	<description>
	OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
	</description>
 </metadata>
<!-- 1f32250cf5aa688728ea37d4b957de8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061649" comment="OpenOffice_org-base-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061567" comment="OpenOffice_org-base less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061435" comment="OpenOffice_org-branding-SLED less than 3.2.1-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061650" comment="OpenOffice_org-calc-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061570" comment="OpenOffice_org-calc less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061572" comment="OpenOffice_org-components less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061652" comment="OpenOffice_org-draw-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061573" comment="OpenOffice_org-draw less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061575" comment="OpenOffice_org-filters-optional less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061576" comment="OpenOffice_org-filters less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061577" comment="OpenOffice_org-gnome less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061581" comment="OpenOffice_org-help-de less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061582" comment="OpenOffice_org-help-en-GB less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061584" comment="OpenOffice_org-help-en-US less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061585" comment="OpenOffice_org-help-es less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061586" comment="OpenOffice_org-help-fr less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061589" comment="OpenOffice_org-help-ja less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061655" comment="OpenOffice_org-help-ko less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061592" comment="OpenOffice_org-help-pt-BR less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061594" comment="OpenOffice_org-help-ru less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061595" comment="OpenOffice_org-help-sv less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061596" comment="OpenOffice_org-help-zh-CN less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061597" comment="OpenOffice_org-help-zh-TW less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061598" comment="OpenOffice_org-icon-themes less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061656" comment="OpenOffice_org-impress-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061600" comment="OpenOffice_org-impress less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061607" comment="OpenOffice_org-l10n-de less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061608" comment="OpenOffice_org-l10n-el less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061609" comment="OpenOffice_org-l10n-en-GB less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061610" comment="OpenOffice_org-l10n-es less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061612" comment="OpenOffice_org-l10n-extras less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061613" comment="OpenOffice_org-l10n-fi less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061614" comment="OpenOffice_org-l10n-fr less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061616" comment="OpenOffice_org-l10n-it less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061617" comment="OpenOffice_org-l10n-ja less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061659" comment="OpenOffice_org-l10n-ko less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061619" comment="OpenOffice_org-l10n-nl less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061621" comment="OpenOffice_org-l10n-pl less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061622" comment="OpenOffice_org-l10n-pt-BR less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061623" comment="OpenOffice_org-l10n-pt less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061624" comment="OpenOffice_org-l10n-ru less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061626" comment="OpenOffice_org-l10n-sv less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061628" comment="OpenOffice_org-l10n-zh-CN less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061629" comment="OpenOffice_org-l10n-zh-TW less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061632" comment="OpenOffice_org-libs-core less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061634" comment="OpenOffice_org-libs-extern less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061636" comment="OpenOffice_org-libs-gui less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061638" comment="OpenOffice_org-math less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061644" comment="OpenOffice_org-ure less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061660" comment="OpenOffice_org-writer-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061646" comment="OpenOffice_org-writer less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061647" comment="OpenOffice_org less than 3.2.1.4-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
	<description>
	Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
	</description>
 </metadata>
<!-- 7f9133a2e7b75f305719d6c9d344da66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063185" comment="bzip2 less than 1.0.5-34.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063188" comment="libbz2-1 less than 1.0.5-34.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
	<description>
	Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
	</description>
 </metadata>
<!-- 63974d8f237a90167f2bcd25e798f266 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063350" comment="pcsc-lite less than 1.4.102-1.31.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
	<description>
	libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
	</description>
 </metadata>
<!-- 228123734ed05fdf133a31b840b3f5eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
	<description>
	gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
	</description>
 </metadata>
<!-- 228123734ed05fdf133a31b840b3f5eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
	<description>
	The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
	</description>
 </metadata>
<!-- 1eec13a2ab4a0b3532db79684cca7244 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058917" comment="cron less than 4.1-194.19.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0426</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
	</description>
 </metadata>
<!-- 124c00f8ec7af7699c37f084b91538eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058612" comment="sudo less than 1.6.9p17-21.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0427</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.
	</description>
 </metadata>
<!-- 124c00f8ec7af7699c37f084b91538eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058612" comment="sudo less than 1.6.9p17-21.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
	</description>
 </metadata>
<!-- 7bc2a1316bdaca006f9ad5c79d9cfadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
	</description>
 </metadata>
<!-- 7bc2a1316bdaca006f9ad5c79d9cfadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0789</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0789" source="CVE"/>
	<description>
	fusermount in FUSE before 2.7.5, and 2.8.x before 2.8.2, allows local users to unmount an arbitrary FUSE filesystem share via a symlink attack on a mountpoint.
	</description>
 </metadata>
<!-- d5e939b450bf8f85d0ab39bcb4d888de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060020" comment="libfuse2 less than 2.7.2-61.18.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0830</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" source="CVE"/>
	<description>
	Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
	</description>
 </metadata>
<!-- cbbfc77344a13615f40bc3e63eae3c18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0887</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business JDK and JRE 6 Update 18 and 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 0599565987b5141ae0fb0ed2a25158ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059812" comment="java-1_6_0-sun-plugin less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059814" comment="java-1_6_0-sun less than 1.6.0.u20-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
	<description>
	The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
	</description>
 </metadata>
<!-- 7bc2a1316bdaca006f9ad5c79d9cfadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
	<description>
	Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
	<description>
	The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1166" source="CVE"/>
	<description>
	The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
	</description>
 </metadata>
<!-- 9e7b4d8773a4b8c471f7626de3c0075d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064561" comment="xorg-x11-Xvnc less than 7.4-27.15.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064562" comment="xorg-x11-server-extra less than 7.4-27.15.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064563" comment="xorg-x11-server less than 7.4-27.15.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
	<description>
	Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
	<description>
	Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
	</description>
 </metadata>
<!-- afa2fc24660b248720202396a9eb1891 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061668" comment="MozillaFirefox-translations less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061192" comment="MozillaFirefox less than 3.5.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061669" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061670" comment="mozilla-xulrunner191 less than 1.9.1.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
	<description>
	Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
	</description>
 </metadata>
<!-- 9189d3d921df38309e81cceb3aae180f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064837" comment="libpng12-0 less than 1.2.39-1.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1240" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1241</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241" source="CVE"/>
	<description>
	Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005.
	</description>
 </metadata>
<!-- 18b561cd6fdd96d3054b17d98025f4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1285</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1295</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0cf0e14d6be33e34a251369217e33234 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
	</criteria>
	<!-- 83f912f0658bb1def5318620c4d7c104 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
	<description>
	The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- bc303bfa8cab781dfd75bb6ccac350c6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060716" comment="krb5 less than 1.6.3-133.33.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
	</description>
 </metadata>
<!-- 9d0b7ef1c0e821c34e484a99885a70dc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
	</description>
 </metadata>
<!-- 9d0b7ef1c0e821c34e484a99885a70dc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1628</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628" source="CVE"/>
	<description>
	Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
	</description>
 </metadata>
<!-- e9e3fb1b1de3729817a856d6929d6b28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1869</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file.
	</description>
 </metadata>
<!-- e9e3fb1b1de3729817a856d6929d6b28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2055</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055" source="CVE"/>
	<description>
	Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
	</description>
 </metadata>
<!-- e9e3fb1b1de3729817a856d6929d6b28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
	<description>
	Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
	</description>
 </metadata>
<!-- 7bc2a1316bdaca006f9ad5c79d9cfadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2160</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an invalid offset in an unspecified undocumented opcode in ActionScript Virtual Machine 2, related to getouterscope, a different vulnerability than CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2161</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161" source="CVE"/>
	<description>
	Array index error in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified "types of Adobe Flash code."
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors related to improper length calculation and the (1) STSC, (2) STSZ, and (3) STCO atoms.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2163</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2164</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164" source="CVE"/>
	<description>
	Use-after-free vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to an unspecified "image type within a certain function."
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2165</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2167</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to malformed (1) GIF or (2) JPEG data.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2168</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2169</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allow attackers to cause a denial of service (pointer memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2181 and CVE-2010-2183.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2171</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors related to SWF files, decompression of embedded JPEG image data, and the DefineBits and other unspecified tags, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2172</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172" source="CVE"/>
	<description>
	Adobe Flash Player 9 before 9.0.277.0 on unspecified UNIX platforms allows attackers to cause a denial of service via unknown vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newclass (0x58) operator, a different vulnerability than CVE-2010-2174.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newfunction (0x44) operator, a different vulnerability than CVE-2010-2173.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2180</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2183.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2184</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2185</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2186</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2188</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by calling the ActionScript native object 2200 connect method multiple times with different arguments, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2187.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0cf0e14d6be33e34a251369217e33234 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
	</criteria>
	<!-- 3e6cf94a9285a46824dbeab3656597f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2189</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when used in conjunction with VMWare Tools on a VMWare platform, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 0cf0e14d6be33e34a251369217e33234 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content involving the (1) pushstring (0x2C) operator, (2) debugfile (0xF1) operator, and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2168.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2203</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2204</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, access uninitialized memory, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2206</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206" source="CVE"/>
	<description>
	Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2207</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2208</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2210</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2211</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2212.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2212</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.
	</description>
 </metadata>
<!-- 83f912f0658bb1def5318620c4d7c104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2213</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
<!-- 3e6cf94a9285a46824dbeab3656597f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2214</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216.
	</description>
 </metadata>
<!-- 3e6cf94a9285a46824dbeab3656597f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2215</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "click-jacking" issue.
	</description>
 </metadata>
<!-- 3e6cf94a9285a46824dbeab3656597f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2216</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2214.
	</description>
 </metadata>
<!-- 3e6cf94a9285a46824dbeab3656597f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
	<description>
	The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
	</description>
 </metadata>
<!-- 9e7b4d8773a4b8c471f7626de3c0075d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064561" comment="xorg-x11-Xvnc less than 7.4-27.15.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064562" comment="xorg-x11-server-extra less than 7.4-27.15.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064563" comment="xorg-x11-server less than 7.4-27.15.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2249</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249" source="CVE"/>
	<description>
	Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
	</description>
 </metadata>
<!-- 9189d3d921df38309e81cceb3aae180f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064837" comment="libpng12-0 less than 1.2.39-1.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
	<description>
	Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" source="CVE"/>
	<description>
	The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2499</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LaserWriter PS font file with an embedded PFB fragment.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" source="CVE"/>
	<description>
	Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2519</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2520</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2527</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" source="CVE"/>
	<description>
	Multiple buffer overflows in demo programs in FreeType before 2.4.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" source="CVE"/>
	<description>
	Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
	<description>
	Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
	</description>
 </metadata>
<!-- 232e6f1824275744985b33aa3b11f785 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061951" comment="gpg2-lang less than 2.0.9-25.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061952" comment="gpg2 less than 2.0.9-25.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2763</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox before 3.5.12, Thunderbird before 3.0.7, and SeaMonkey before 2.0.7 does not properly restrict scripted functions, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted function.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
	<description>
	Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
	<description>
	The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
	<description>
	The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2770</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2770" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Mac OS X allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted font in a data: URL.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
	<description>
	The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2806</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" source="CVE"/>
	<description>
	Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2807</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" source="CVE"/>
	<description>
	FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2808</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
	</description>
 </metadata>
<!-- 82a5ed28b06cee4152438322073055fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2883</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883" source="CVE"/>
	<description>
	Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2884</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884" source="CVE"/>
	<description>
	Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a1fed780418cc33f1d569f3f8af93c44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062813" comment="flash-player less than 10.1.85.3-0.1.1"/>
	</criteria>
	<!-- d09abb29b0b7077a299262dca5bbe83e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2887</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2889</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-3626.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2890</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
	<description>
	simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
	</description>
 </metadata>
<!-- 068c7f33bfe44cf3dc0d8b1bcd81cf79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063683" comment="OpenOffice_org-base-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063619" comment="OpenOffice_org-base less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063684" comment="OpenOffice_org-calc-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063622" comment="OpenOffice_org-calc less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063624" comment="OpenOffice_org-components less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063685" comment="OpenOffice_org-draw-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063625" comment="OpenOffice_org-draw less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063627" comment="OpenOffice_org-filters-optional less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063628" comment="OpenOffice_org-filters less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063629" comment="OpenOffice_org-gnome less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063631" comment="OpenOffice_org-help-en-US less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063632" comment="OpenOffice_org-icon-themes less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063686" comment="OpenOffice_org-impress-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063634" comment="OpenOffice_org-impress less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063641" comment="OpenOffice_org-l10n-de less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063642" comment="OpenOffice_org-l10n-el less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063643" comment="OpenOffice_org-l10n-en-GB less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063644" comment="OpenOffice_org-l10n-es less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063646" comment="OpenOffice_org-l10n-extras less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063647" comment="OpenOffice_org-l10n-fi less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063648" comment="OpenOffice_org-l10n-fr less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063650" comment="OpenOffice_org-l10n-it less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063651" comment="OpenOffice_org-l10n-ja less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063689" comment="OpenOffice_org-l10n-ko less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063653" comment="OpenOffice_org-l10n-nl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063655" comment="OpenOffice_org-l10n-pl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063656" comment="OpenOffice_org-l10n-pt-BR less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063657" comment="OpenOffice_org-l10n-pt less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063658" comment="OpenOffice_org-l10n-ru less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063660" comment="OpenOffice_org-l10n-sv less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063662" comment="OpenOffice_org-l10n-zh-CN less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063663" comment="OpenOffice_org-l10n-zh-TW less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063666" comment="OpenOffice_org-libs-core less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063668" comment="OpenOffice_org-libs-extern less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063670" comment="OpenOffice_org-libs-gui less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063672" comment="OpenOffice_org-math less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063675" comment="OpenOffice_org-pyuno less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063678" comment="OpenOffice_org-ure less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063690" comment="OpenOffice_org-writer-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063680" comment="OpenOffice_org-writer less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063681" comment="OpenOffice_org less than 3.2.1.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
	<description>
	Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 068c7f33bfe44cf3dc0d8b1bcd81cf79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063683" comment="OpenOffice_org-base-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063619" comment="OpenOffice_org-base less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063684" comment="OpenOffice_org-calc-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063622" comment="OpenOffice_org-calc less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063624" comment="OpenOffice_org-components less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063685" comment="OpenOffice_org-draw-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063625" comment="OpenOffice_org-draw less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063627" comment="OpenOffice_org-filters-optional less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063628" comment="OpenOffice_org-filters less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063629" comment="OpenOffice_org-gnome less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063631" comment="OpenOffice_org-help-en-US less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063632" comment="OpenOffice_org-icon-themes less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063686" comment="OpenOffice_org-impress-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063634" comment="OpenOffice_org-impress less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063641" comment="OpenOffice_org-l10n-de less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063642" comment="OpenOffice_org-l10n-el less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063643" comment="OpenOffice_org-l10n-en-GB less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063644" comment="OpenOffice_org-l10n-es less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063646" comment="OpenOffice_org-l10n-extras less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063647" comment="OpenOffice_org-l10n-fi less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063648" comment="OpenOffice_org-l10n-fr less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063650" comment="OpenOffice_org-l10n-it less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063651" comment="OpenOffice_org-l10n-ja less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063689" comment="OpenOffice_org-l10n-ko less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063653" comment="OpenOffice_org-l10n-nl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063655" comment="OpenOffice_org-l10n-pl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063656" comment="OpenOffice_org-l10n-pt-BR less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063657" comment="OpenOffice_org-l10n-pt less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063658" comment="OpenOffice_org-l10n-ru less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063660" comment="OpenOffice_org-l10n-sv less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063662" comment="OpenOffice_org-l10n-zh-CN less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063663" comment="OpenOffice_org-l10n-zh-TW less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063666" comment="OpenOffice_org-libs-core less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063668" comment="OpenOffice_org-libs-extern less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063670" comment="OpenOffice_org-libs-gui less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063672" comment="OpenOffice_org-math less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063675" comment="OpenOffice_org-pyuno less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063678" comment="OpenOffice_org-ure less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063690" comment="OpenOffice_org-writer-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063680" comment="OpenOffice_org-writer less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063681" comment="OpenOffice_org less than 3.2.1.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
	<description>
	bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
	</description>
 </metadata>
<!-- 51037645e920c162445092798d3a5a6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063353" comment="freetype2 less than 2.3.7-25.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
	</description>
 </metadata>
<!-- 51037645e920c162445092798d3a5a6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063353" comment="freetype2 less than 2.3.7-25.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
	</description>
 </metadata>
<!-- b402ae1ecc407a86d722a207aa2fc95c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062890" comment="cifs-mount less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062894" comment="libsmbclient0 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062897" comment="libtalloc1 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062900" comment="libtdb1 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062903" comment="libwbclient0 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062907" comment="samba-client less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062913" comment="samba less than 3.2.7-11.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3131</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3131" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
	<description>
	The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- 9ea15a571f1185438a352e0171119167 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064287" comment="libfreebl3 less than 3.12.8-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064288" comment="mozilla-nspr less than 4.8.6-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064289" comment="mozilla-nss less than 3.12.8-1.2.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
	<description>
	Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
	<description>
	A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
	<description>
	The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c41797d0f3550854dbd1adc11a1bbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064212" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064214" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.15"/>
		</criteria>
	</criteria>
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
	<!-- d01f883768498112825b6f527d7faa56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064290" comment="MozillaFirefox-translations less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064291" comment="MozillaFirefox less than 3.6.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064292" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064293" comment="mozilla-xulrunner192 less than 1.9.2.12-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
	<description>
	Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
	</description>
 </metadata>
<!-- 51037645e920c162445092798d3a5a6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063353" comment="freetype2 less than 2.3.7-25.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3552</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3552" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3554</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to "permissions granted to certain system objects."
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3555" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3558</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3558" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3561</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this involves the use of the privileged accept method in the ServerSocket class, which does not limit which hosts can connect and allows remote attackers to bypass intended network access restrictions.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3567</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to a calculation error in right-to-left text character counts for the ICU OpenType font rendering implementation, which triggers an out-of-bounds memory access.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3570</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3570" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment Toolkit component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
	</description>
 </metadata>
<!-- 5c56ea4ceed4d4dd7544a6791ca51453 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3619</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3620</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3621</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3622</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3623</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3623" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3624</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3624" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via a crafted image.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3626</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-2889.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3627</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3628</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3629</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3630</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3631</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3631" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3632</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3658.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3636</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3637</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3637" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 (Flash10h.ocx) on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FLV video.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3638</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3638" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Mac OS X, when Safari is used, allows attackers to obtain sensitive information via unknown vectors.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3639</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3640</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3641</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3642</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3643</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3644</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3645</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3646</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3647</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3648</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3649</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3650</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3651</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3651" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3652</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3654</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab8f036d5813a7b57c631c92e5c5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064940" comment="acroread less than 9.4.1-0.1.1"/>
	</criteria>
	<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3656</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3657.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3657</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3656.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3658</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3632.
	</description>
 </metadata>
<!-- d09abb29b0b7077a299262dca5bbe83e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
	<description>
	The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- 95c80e3ae998de7c4171c12a5c699e79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065287" comment="xpdf-tools less than 3.02-138.29.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3704</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
	</description>
 </metadata>
<!-- 95c80e3ae998de7c4171c12a5c699e79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065287" comment="xpdf-tools less than 3.02-138.29.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6430ee5083ef05fb2cfc02e79bb01b6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 74c351fadb3e3593a42222a8e8a42de8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064511" comment="MozillaFirefox-translations less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064512" comment="MozillaFirefox less than 3.6.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064513" comment="mozilla-xulrunner192-translations less than 1.9.2.12-0.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064514" comment="mozilla-xulrunner192 less than 1.9.2.12-0.6.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3847</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" source="CVE"/>
	<description>
	elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
	</description>
 </metadata>
<!-- cbbfc77344a13615f40bc3e63eae3c18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3856</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" source="CVE"/>
	<description>
	ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
	</description>
 </metadata>
<!-- cbbfc77344a13615f40bc3e63eae3c18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
	<description>
	Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
	</description>
 </metadata>
<!-- e2460a698bf82f7149c21a59f972fd18 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064395" comment="libopenssl0_9_8 less than 0.9.8h-30.22.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064397" comment="openssl less than 0.9.8h-30.22.28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3976</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player.
	</description>
 </metadata>
<!-- dfdcc8fef212f7e39fa5b0d19469fd4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
	</description>
 </metadata>
<!-- 9d0b7ef1c0e821c34e484a99885a70dc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
	<description>
	The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
	</description>
 </metadata>
<!-- 9d0b7ef1c0e821c34e484a99885a70dc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4091</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091" source="CVE"/>
	<description>
	The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 1f8ab8f036d5813a7b57c631c92e5c5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009058584" comment="sle11-moblin21 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064940" comment="acroread less than 9.4.1-0.1.1"/>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058584" version="1" comment="moblin-release is ==2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064037" version="1" comment="glibc-i18ndata is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064040" version="1" comment="glibc-locale is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064043" version="1" comment="glibc is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064044" version="1" comment="nscd is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060833" version="1" comment="flash-player is &lt;10.1.53.64-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061668" version="1" comment="MozillaFirefox-translations is &lt;3.5.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061192" version="1" comment="MozillaFirefox is &lt;3.5.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061669" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061670" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059839" version="1" comment="gimp-branding-upstream is &lt;2.6.2-3.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059682" version="1" comment="gimp-lang is &lt;2.6.2-3.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059684" version="1" comment="gimp is &lt;2.6.2-3.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058362" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058352" version="1" comment="MozillaFirefox is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058357" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060327" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060331" version="1" comment="python-base is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060429" version="1" comment="python-devel is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060338" version="1" comment="python-xml is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060339" version="1" comment="python is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061093" version="1" comment="libvorbis is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059250" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059252" version="1" comment="openssl is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059195" version="1" comment="cups-client is &lt;1.3.9-8.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059196" version="1" comment="cups-libs is &lt;1.3.9-8.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059197" version="1" comment="cups is &lt;1.3.9-8.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059840" version="1" comment="cups-client is &lt;1.3.9-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059841" version="1" comment="cups-libs is &lt;1.3.9-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059842" version="1" comment="cups is &lt;1.3.9-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059481" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065171" version="1" comment="gnutls is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065189" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065174" version="1" comment="libgnutls26 is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054877" version="1" comment="hunspell is &lt;1.2.7-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060657" version="1" comment="libmozhelper-1_0-0 is &lt;0.1.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060658" version="1" comment="moblin-internet-browser-translations is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060659" version="1" comment="moblin-internet-browser is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063828" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063830" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059417" version="1" comment="libfreebl3 is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059421" version="1" comment="mozilla-nss is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059482" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059483" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059486" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059488" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061860" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061862" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061863" version="1" comment="ghostscript-library is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061865" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061866" version="1" comment="libgimpprint is &lt;4.2.7-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058588" version="1" comment="netpbm is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058565" version="1" comment="libpurple-lang is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058568" version="1" comment="libpurple is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057994" version="1" comment="flash-player is &lt;10.0.45.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058548" version="1" comment="acroread is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059801" version="1" comment="acroread is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060316" version="1" comment="libpng12-0 is &lt;1.2.39-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061978" version="1" comment="flash-player is &lt;10.1.82.76-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061649" version="1" comment="OpenOffice_org-base-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061567" version="1" comment="OpenOffice_org-base is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061435" version="1" comment="OpenOffice_org-branding-SLED is &lt;3.2.1-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061650" version="1" comment="OpenOffice_org-calc-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061570" version="1" comment="OpenOffice_org-calc is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061572" version="1" comment="OpenOffice_org-components is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061652" version="1" comment="OpenOffice_org-draw-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061573" version="1" comment="OpenOffice_org-draw is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061575" version="1" comment="OpenOffice_org-filters-optional is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061576" version="1" comment="OpenOffice_org-filters is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061577" version="1" comment="OpenOffice_org-gnome is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061581" version="1" comment="OpenOffice_org-help-de is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061582" version="1" comment="OpenOffice_org-help-en-GB is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061584" version="1" comment="OpenOffice_org-help-en-US is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061585" version="1" comment="OpenOffice_org-help-es is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061586" version="1" comment="OpenOffice_org-help-fr is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061589" version="1" comment="OpenOffice_org-help-ja is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061655" version="1" comment="OpenOffice_org-help-ko is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061592" version="1" comment="OpenOffice_org-help-pt-BR is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061594" version="1" comment="OpenOffice_org-help-ru is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061595" version="1" comment="OpenOffice_org-help-sv is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061596" version="1" comment="OpenOffice_org-help-zh-CN is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061597" version="1" comment="OpenOffice_org-help-zh-TW is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061598" version="1" comment="OpenOffice_org-icon-themes is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061656" version="1" comment="OpenOffice_org-impress-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061600" version="1" comment="OpenOffice_org-impress is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061607" version="1" comment="OpenOffice_org-l10n-de is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061608" version="1" comment="OpenOffice_org-l10n-el is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061609" version="1" comment="OpenOffice_org-l10n-en-GB is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061610" version="1" comment="OpenOffice_org-l10n-es is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061612" version="1" comment="OpenOffice_org-l10n-extras is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061613" version="1" comment="OpenOffice_org-l10n-fi is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061614" version="1" comment="OpenOffice_org-l10n-fr is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061616" version="1" comment="OpenOffice_org-l10n-it is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061617" version="1" comment="OpenOffice_org-l10n-ja is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061659" version="1" comment="OpenOffice_org-l10n-ko is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061619" version="1" comment="OpenOffice_org-l10n-nl is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061621" version="1" comment="OpenOffice_org-l10n-pl is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061622" version="1" comment="OpenOffice_org-l10n-pt-BR is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061623" version="1" comment="OpenOffice_org-l10n-pt is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061624" version="1" comment="OpenOffice_org-l10n-ru is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061626" version="1" comment="OpenOffice_org-l10n-sv is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061628" version="1" comment="OpenOffice_org-l10n-zh-CN is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061629" version="1" comment="OpenOffice_org-l10n-zh-TW is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061632" version="1" comment="OpenOffice_org-libs-core is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061634" version="1" comment="OpenOffice_org-libs-extern is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061636" version="1" comment="OpenOffice_org-libs-gui is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061638" version="1" comment="OpenOffice_org-math is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061644" version="1" comment="OpenOffice_org-ure is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061660" version="1" comment="OpenOffice_org-writer-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061646" version="1" comment="OpenOffice_org-writer is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061647" version="1" comment="OpenOffice_org is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063185" version="1" comment="bzip2 is &lt;1.0.5-34.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063188" version="1" comment="libbz2-1 is &lt;1.0.5-34.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063350" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058917" version="1" comment="cron is &lt;4.1-194.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058612" version="1" comment="sudo is &lt;1.6.9p17-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060901" version="1" comment="cifs-mount is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060905" version="1" comment="libsmbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060908" version="1" comment="libtalloc1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060911" version="1" comment="libtdb1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060914" version="1" comment="libwbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060918" version="1" comment="samba-client is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060924" version="1" comment="samba is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060020" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059812" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059814" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064561" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.15.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064562" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.15.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064563" version="1" comment="xorg-x11-server is &lt;7.4-27.15.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064837" version="1" comment="libpng12-0 is &lt;1.2.39-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061132" version="1" comment="acroread is &lt;9.3.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060716" version="1" comment="krb5 is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064613" version="1" comment="krb5 is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062065" version="1" comment="freetype2 is &lt;2.3.7-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061951" version="1" comment="gpg2-lang is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061952" version="1" comment="gpg2 is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064212" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064214" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063368" version="1" comment="acroread is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062813" version="1" comment="flash-player is &lt;10.1.85.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063683" version="1" comment="OpenOffice_org-base-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063619" version="1" comment="OpenOffice_org-base is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063684" version="1" comment="OpenOffice_org-calc-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063622" version="1" comment="OpenOffice_org-calc is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063624" version="1" comment="OpenOffice_org-components is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063685" version="1" comment="OpenOffice_org-draw-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063625" version="1" comment="OpenOffice_org-draw is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063627" version="1" comment="OpenOffice_org-filters-optional is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063628" version="1" comment="OpenOffice_org-filters is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063629" version="1" comment="OpenOffice_org-gnome is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063631" version="1" comment="OpenOffice_org-help-en-US is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063632" version="1" comment="OpenOffice_org-icon-themes is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063686" version="1" comment="OpenOffice_org-impress-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063634" version="1" comment="OpenOffice_org-impress is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063641" version="1" comment="OpenOffice_org-l10n-de is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063642" version="1" comment="OpenOffice_org-l10n-el is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063643" version="1" comment="OpenOffice_org-l10n-en-GB is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063644" version="1" comment="OpenOffice_org-l10n-es is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063646" version="1" comment="OpenOffice_org-l10n-extras is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063647" version="1" comment="OpenOffice_org-l10n-fi is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063648" version="1" comment="OpenOffice_org-l10n-fr is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063650" version="1" comment="OpenOffice_org-l10n-it is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063651" version="1" comment="OpenOffice_org-l10n-ja is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063689" version="1" comment="OpenOffice_org-l10n-ko is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063653" version="1" comment="OpenOffice_org-l10n-nl is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063655" version="1" comment="OpenOffice_org-l10n-pl is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063656" version="1" comment="OpenOffice_org-l10n-pt-BR is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063657" version="1" comment="OpenOffice_org-l10n-pt is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063658" version="1" comment="OpenOffice_org-l10n-ru is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063660" version="1" comment="OpenOffice_org-l10n-sv is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063662" version="1" comment="OpenOffice_org-l10n-zh-CN is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063663" version="1" comment="OpenOffice_org-l10n-zh-TW is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063666" version="1" comment="OpenOffice_org-libs-core is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063668" version="1" comment="OpenOffice_org-libs-extern is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063670" version="1" comment="OpenOffice_org-libs-gui is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063672" version="1" comment="OpenOffice_org-math is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063675" version="1" comment="OpenOffice_org-pyuno is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063678" version="1" comment="OpenOffice_org-ure is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063690" version="1" comment="OpenOffice_org-writer-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063680" version="1" comment="OpenOffice_org-writer is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063681" version="1" comment="OpenOffice_org is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063353" version="1" comment="freetype2 is &lt;2.3.7-25.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062890" version="1" comment="cifs-mount is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062894" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062897" version="1" comment="libtalloc1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062900" version="1" comment="libtdb1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062903" version="1" comment="libwbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062907" version="1" comment="samba-client is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062913" version="1" comment="samba is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064194" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064195" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064511" version="1" comment="MozillaFirefox-translations is &lt;3.6.12-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064512" version="1" comment="MozillaFirefox is &lt;3.6.12-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064513" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064514" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064287" version="1" comment="libfreebl3 is &lt;3.12.8-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064288" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064289" version="1" comment="mozilla-nss is &lt;3.12.8-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064290" version="1" comment="MozillaFirefox-translations is &lt;3.6.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064291" version="1" comment="MozillaFirefox is &lt;3.6.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064292" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064293" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064245" version="1" comment="flash-player is &lt;10.1.102.64-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064940" version="1" comment="acroread is &lt;9.4.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065287" version="1" comment="xpdf-tools is &lt;3.02-138.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064395" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064397" version="1" comment="openssl is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moblin-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozhelper-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moblin-internet-browser-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moblin-internet-browser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-components</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-extern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">2.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.53.64-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u22-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.45.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.39-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.82.76-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1.4-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u20-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.39-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.85.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.102.64-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.28.1</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
