<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2012-07-03T18:06:25</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20051038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1038</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2005-1038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1038" source="CVE"/>
	<description>
	crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink.  NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.
	</description>
 </metadata>
<!-- c2857422a97127436f7c7c580480fe5e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038565" comment="cron less than 4.1-70"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2090</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2005-2090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090" source="CVE"/>
	<description>
	Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4348</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2005-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348" source="CVE"/>
	<description>
	fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
	</description>
 </metadata>
<!-- 05c9e69e5b94350af3cb539a3667ee82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039431" comment="fetchmail less than 6.3.5-23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1861</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.
	</description>
 </metadata>
<!-- e9051a44079d3f69cc1996bc53a8ac1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039948" comment="NX less than 1.5.0-75"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2894</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-2894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.0.4, 2.0.x before 2.0.0.8, Mozilla Suite 1.7.13, Mozilla SeaMonkey 1.0.2 and other versions before 1.1.5, and Netscape 8.1 and earlier allow user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2940</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940" source="CVE"/>
	<description>
	OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
	</description>
 </metadata>
<!-- b7dfa4c9cfaf8657e2602bbbcf92ec30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040765" comment="openssl-32bit less than 0.9.8d-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040766" comment="openssl-64bit less than 0.9.8d-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040767" comment="openssl-devel-32bit less than 0.9.8d-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040768" comment="openssl-devel-64bit less than 0.9.8d-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040769" comment="openssl-devel less than 0.9.8d-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040770" comment="openssl less than 0.9.8d-17.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3126</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-3126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3126" source="CVE"/>
	<description>
	c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number.
	</description>
 </metadata>
<!-- a20b9d32c5258560e97fe4595efee466 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040833" comment="capi4hylafax less than 4.3.0-25.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3467</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467" source="CVE"/>
	<description>
	Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
	</description>
 </metadata>
<!-- e9051a44079d3f69cc1996bc53a8ac1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039948" comment="NX less than 1.5.0-75"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4250</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-4250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4250" source="CVE"/>
	<description>
	Buffer overflow in man and mandb (man-db) 2.4.3 and earlier allows local users to execute arbitrary code via crafted arguments to the -H flag.
	</description>
 </metadata>
<!-- 2f2141cd4646d2d37f26921c947c6946 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041460" comment="man less than 2.4.3-28"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
	<description>
	Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 92964e9c602e02009a76911891903746 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041586" comment="perl-Tk less than 804.027-33"/>
	</criteria>
	<!-- ab5a31733d5d4eb3e990eef6a50da2c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041587" comment="tkimg less than 1.3-69"/>
	</criteria>
	<!-- d1529b954f0e9cddfcd0451e625ee890 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041590" comment="SDL_image-devel less than 1.2.5-27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041591" comment="SDL_image less than 1.2.5-27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4519</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-4519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519" source="CVE"/>
	<description>
	Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.
	</description>
 </metadata>
<!-- bfc8872fdac9ebf3d002116c1937b029 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041616" comment="gimp-devel less than 2.2.13-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041617" comment="gimp-unstable-devel less than 2.3.11-51.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041618" comment="gimp-unstable less than 2.3.11-51.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041619" comment="gimp less than 2.2.13-35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4965</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965" source="CVE"/>
	<description>
	Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain.  NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5330</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5330" source="CVE"/>
	<description>
	CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType.  NOTE: the flexibility of the attack varies depending on the type of web browser being used.
	</description>
 </metadata>
<!-- 0ea8e66732bf0740881da44bc2526b0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030946" comment="flash-player less than 7.0.69.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5456</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456" source="CVE"/>
	<description>
	Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38fc0612e54f79dd4092c3f4ba06d4ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042205" comment="GraphicsMagick-c++-devel less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042206" comment="GraphicsMagick-c++ less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042207" comment="GraphicsMagick-devel less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042208" comment="GraphicsMagick less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042209" comment="perl-GraphicsMagick less than 1.1.7-35.1"/>
		</criteria>
	</criteria>
	<!-- 7542242c83690883b3dc5bb6629bcd84 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042228" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042229" comment="ImageMagick-Magick++ less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042230" comment="ImageMagick-devel less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042231" comment="ImageMagick less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042232" comment="perl-PerlMagick less than 6.3.0.0-27.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5749</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749" source="CVE"/>
	<description>
	The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.
	</description>
 </metadata>
<!-- c1105207e27fe2ea07c62b7c1f2c7673 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042416" comment="kernel-bigsmp less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042417" comment="kernel-default less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042418" comment="kernel-iseries64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042419" comment="kernel-ppc64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042420" comment="kernel-source less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042421" comment="kernel-syms less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042422" comment="kernel-xen less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042423" comment="kernel-xenpae less than 2.6.18.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5751</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5751" source="CVE"/>
	<description>
	Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.
	</description>
 </metadata>
<!-- c1105207e27fe2ea07c62b7c1f2c7673 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042416" comment="kernel-bigsmp less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042417" comment="kernel-default less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042418" comment="kernel-iseries64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042419" comment="kernel-ppc64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042420" comment="kernel-source less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042421" comment="kernel-syms less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042422" comment="kernel-xen less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042423" comment="kernel-xenpae less than 2.6.18.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5752</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042441" comment="apache2-devel less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042442" comment="apache2-doc less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042443" comment="apache2-example-pages less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042444" comment="apache2-prefork less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042445" comment="apache2-worker less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042446" comment="apache2 less than 2.2.3-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5753</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753" source="CVE"/>
	<description>
	Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
	</description>
 </metadata>
<!-- c1105207e27fe2ea07c62b7c1f2c7673 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042416" comment="kernel-bigsmp less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042417" comment="kernel-default less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042418" comment="kernel-iseries64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042419" comment="kernel-ppc64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042420" comment="kernel-source less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042421" comment="kernel-syms less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042422" comment="kernel-xen less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042423" comment="kernel-xenpae less than 2.6.18.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5857</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.
	</description>
 </metadata>
<!-- 2addb930a455ee97f95fff2cffb7f6b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5864</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers.  NOTE: this issue can be exploited through other products that use gv such as evince.
	</description>
 </metadata>
<!-- f8dc316cd51743b0047717d57c23ca92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042477" comment="evince less than 0.6.1-22.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5867</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867" source="CVE"/>
	<description>
	fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
	</description>
 </metadata>
<!-- 05c9e69e5b94350af3cb539a3667ee82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039431" comment="fetchmail less than 6.3.5-23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5874</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5874" source="CVE"/>
	<description>
	Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.
	</description>
 </metadata>
<!-- b34d7a9ca735ddbfa9cdb9385b65c744 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033296" comment="clamav less than 0.88.7-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5876</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5876" source="CVE"/>
	<description>
	The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
	</description>
 </metadata>
<!-- d4108f25bf7c7f5d762bea129cd4bb29 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042612" comment="libsoup-32bit less than 2.2.96-31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042613" comment="libsoup-64bit less than 2.2.96-31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042614" comment="libsoup-devel-32bit less than 2.2.96-31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042615" comment="libsoup-devel-64bit less than 2.2.96-31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042616" comment="libsoup-devel less than 2.2.96-31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042617" comment="libsoup less than 2.2.96-31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5974</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-5974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974" source="CVE"/>
	<description>
	fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
	</description>
 </metadata>
<!-- 05c9e69e5b94350af3cb539a3667ee82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039431" comment="fetchmail less than 6.3.5-23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6077</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077" source="CVE"/>
	<description>
	The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6097</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097" source="CVE"/>
	<description>
	GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
	</description>
 </metadata>
<!-- d71c6eacf4460c45dd8ec1d3e2be6a98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042663" comment="tar less than 1.15.1-42.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6101</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
	</description>
 </metadata>
<!-- 3472f93eab5225994dc7f5502eb9016b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042666" comment="xorg-x11-server less than 7.2-30.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6102</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
<!-- 3472f93eab5225994dc7f5502eb9016b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042666" comment="xorg-x11-server less than 7.2-30.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6103</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
<!-- 3472f93eab5225994dc7f5502eb9016b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042666" comment="xorg-x11-server less than 7.2-30.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6106</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6106" source="CVE"/>
	<description>
	Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.
	</description>
 </metadata>
<!-- c1105207e27fe2ea07c62b7c1f2c7673 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042416" comment="kernel-bigsmp less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042417" comment="kernel-default less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042418" comment="kernel-iseries64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042419" comment="kernel-ppc64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042420" comment="kernel-source less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042421" comment="kernel-syms less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042422" comment="kernel-xen less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042423" comment="kernel-xenpae less than 2.6.18.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6142</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6142" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8b5a41d0bf9767383aea9019934301ad -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042679" comment="squirrelmail less than 1.4.9a-2.3"/>
	</criteria>
	<!-- b59575484ecda37955e52f1dcf53c244 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042681" comment="squirrelmail less than 1.4.9a-2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6143</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143" source="CVE"/>
	<description>
	The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 902c64f2a9c9d0720b5c1e9791c77c72 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042691" comment="krb5-32bit less than 1.5.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042692" comment="krb5-64bit less than 1.5.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042693" comment="krb5-server less than 1.5.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042694" comment="krb5 less than 1.5.1-23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6144</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144" source="CVE"/>
	<description>
	The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
	</description>
 </metadata>
<!-- 902c64f2a9c9d0720b5c1e9791c77c72 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042691" comment="krb5-32bit less than 1.5.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042692" comment="krb5-64bit less than 1.5.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042693" comment="krb5-server less than 1.5.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042694" comment="krb5 less than 1.5.1-23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6169</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
	</description>
 </metadata>
<!-- 9e5b9b6fdb21e6a630037715b7235638 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042706" comment="gpg2 less than 1.9.22-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042707" comment="gpg less than 1.4.5-24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6235</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235" source="CVE"/>
	<description>
	A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
	</description>
 </metadata>
<!-- 9e5b9b6fdb21e6a630037715b7235638 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042706" comment="gpg2 less than 1.9.22-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042707" comment="gpg less than 1.4.5-24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6303</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303" source="CVE"/>
	<description>
	The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
	</description>
 </metadata>
<!-- 8597e89a5214e7de49d594c8ef6a0f07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042719" comment="ruby less than 1.8.5-21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6383</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6383" source="CVE"/>
	<description>
	PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
	</description>
 </metadata>
<!-- f739f79e82da704f5b8af50d3db7cb44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6406</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6406" source="CVE"/>
	<description>
	Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
	</description>
 </metadata>
<!-- b34d7a9ca735ddbfa9cdb9385b65c744 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033296" comment="clamav less than 0.88.7-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6481</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6481" source="CVE"/>
	<description>
	Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to cause a denial of service (stack overflow and application crash) by wrapping many layers of multipart/mixed content around a document, a different vulnerability than CVE-2006-5874 and CVE-2006-6406.
	</description>
 </metadata>
<!-- b34d7a9ca735ddbfa9cdb9385b65c744 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033296" comment="clamav less than 0.88.7-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6497</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6498</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, SeaMonkey before 1.0.7, and Mozilla 1.7 and probably earlier on Solaris, allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown impact and attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6499</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499" source="CVE"/>
	<description>
	The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6500</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500" source="CVE"/>
	<description>
	Heap-based buffer overflow in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6501</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6502</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502" source="CVE"/>
	<description>
	Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6503</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to bypass cross-site scripting (XSS) protection by changing the src attribute of an IMG element to a javascript: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6504</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6505</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6506</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506" source="CVE"/>
	<description>
	The "Feed Preview" feature in Mozilla Firefox 2.0 before 2.0.0.1 sends the URL of the feed when requesting favicon.ico icons, which results in a privacy leak that might allow feed viewing services to determine browsing habits.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6507</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507" source="CVE"/>
	<description>
	Mozilla Firefox 2.0 before 2.0.0.1 allows remote attackers to bypass Cross-Site Scripting (XSS) protection via vectors related to a Function.prototype regression error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dd388eaa628478f69bcecd3e22fbaf5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042865" comment="MozillaFirefox-translations less than 2.0.0.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042866" comment="MozillaFirefox less than 2.0.0.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 7106fd53796c332b4aa3516db80668cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042868" comment="MozillaThunderbird-translations less than 1.5.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042867" comment="MozillaThunderbird less than 1.5.0.9-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6772</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772" source="CVE"/>
	<description>
	Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
	</description>
 </metadata>
<!-- 43ce7c7316aacf369cb5e41f308a233a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042925" comment="w3m less than 0.5.1-41.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6799</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6799" source="CVE"/>
	<description>
	SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php.  NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
	</description>
 </metadata>
<!-- 8a16c086232c2a1f591a719fd1faf903 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042930" comment="cacti less than 0.8.6h-36.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6870</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-6870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6870" source="CVE"/>
	<description>
	The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.
	</description>
 </metadata>
<!-- f36c7c8722c145afb7ba00be07edd6bc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042934" comment="avahi-devel less than 0.6.14-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042935" comment="avahi less than 0.6.14-36"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7196</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-7196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7196" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors.  NOTE: this may be related to CVE-2006-0254.1.
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7203</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7203" source="CVE"/>
	<description>
	The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
	</description>
 </metadata>
<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7217</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-7217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7217" source="CVE"/>
	<description>
	Apache Derby before 10.2.1.6 does not determine schema privilege requirements during the DropSchemaNode bind phase, which allows remote authenticated users to execute arbitrary drop schema statements in SQL authorization mode.
	</description>
 </metadata>
<!-- 40802662d0c7f210467b3c8bfd358220 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042965" comment="derby less than 10.3.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7230</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-7230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b1943d148e26523cb52f9ee37d82cf2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042998" comment="pcre-32bit less than 6.7-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042999" comment="pcre-64bit less than 6.7-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043000" comment="pcre-devel less than 6.7-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043001" comment="pcre less than 6.7-25"/>
		</criteria>
	</criteria>
	<!-- f6032275efba24df492b57b2aeb2e5b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043007" comment="pcre-32bit less than 6.7-27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043008" comment="pcre-64bit less than 6.7-27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043009" comment="pcre-devel less than 6.7-27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043010" comment="pcre less than 6.7-27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7232</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2006-7232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7232" source="CVE"/>
	<description>
	sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
	</description>
 </metadata>
<!-- c4b7968ba8262091c58a73fdf922c22a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043029" comment="mysql-Max less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043030" comment="mysql-bench less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043031" comment="mysql-client less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043032" comment="mysql-debug less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043033" comment="mysql-devel less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043034" comment="mysql-shared-32bit less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043035" comment="mysql-shared-64bit less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043036" comment="mysql-shared less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043037" comment="mysql less than 5.0.26-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0002</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions.  NOTE: the integer overflow has been split into CVE-2007-1466.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04fe22a2671e6cc4ada94b544b04c3f0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043039" comment="OpenOffice_org-gnome less than 2.0.4-38.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043040" comment="OpenOffice_org-kde less than 2.0.4-38.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043041" comment="OpenOffice_org-mono less than 2.0.4-38.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043042" comment="OpenOffice_org-officebean less than 2.0.4-38.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043043" comment="OpenOffice_org less than 2.0.4-38.3"/>
		</criteria>
	</criteria>
	<!-- cd6156978264621e723f474da62fc3eb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043176" comment="libwpd-devel less than 0.8.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043177" comment="libwpd-tools less than 0.8.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043178" comment="libwpd less than 0.8.9-1.1"/>
		</criteria>
	</criteria>
	<!-- fea789247cccef51eb440776dff938c0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043207" comment="libwpd-devel less than 0.8.8-4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043208" comment="libwpd less than 0.8.8-4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0003</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0003" source="CVE"/>
	<description>
	pam_unix.so in Linux-PAM 0.99.7.0 allows context-dependent attackers to log into accounts whose password hash, as stored in /etc/passwd or /etc/shadow, has only two characters.
	</description>
 </metadata>
<!-- 348721c8a00fd09b9a4b1e432e5b509d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043209" comment="pam-32bit less than 0.99.6.3-29.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043210" comment="pam-64bit less than 0.99.6.3-29.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043211" comment="pam less than 0.99.6.3-29.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0006</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0006" source="CVE"/>
	<description>
	The key serial number collision avoidance code in the key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a denial of service (crash) via vectors that trigger a null dereference, as originally reported as "spinlock CPU recursion."
	</description>
 </metadata>
<!-- c1105207e27fe2ea07c62b7c1f2c7673 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042416" comment="kernel-bigsmp less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042417" comment="kernel-default less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042418" comment="kernel-iseries64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042419" comment="kernel-ppc64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042420" comment="kernel-source less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042421" comment="kernel-syms less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042422" comment="kernel-xen less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042423" comment="kernel-xenpae less than 2.6.18.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0008</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008" source="CVE"/>
	<description>
	Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 9bff634d328ed38e2d8e19d2f47d0c68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043213" comment="MozillaThunderbird-translations less than 1.5.0.10-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043212" comment="MozillaThunderbird less than 1.5.0.10-1.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0009</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009" source="CVE"/>
	<description>
	Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0010</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010" source="CVE"/>
	<description>
	The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
	</description>
 </metadata>
<!-- 11d6e65f3d34ce451e1dea24d5154cdb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043214" comment="gtk2-32bit less than 2.10.6-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043215" comment="gtk2-64bit less than 2.10.6-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043216" comment="gtk2 less than 2.10.6-24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0017</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file.
	</description>
 </metadata>
<!-- 1318ddcc99a3894d59750752fcfc56a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043235" comment="xine-devel less than 1.1.2-40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043236" comment="xine-extra less than 1.1.2-40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043237" comment="xine-lib-32bit less than 1.1.2-40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043238" comment="xine-lib-64bit less than 1.1.2-40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043239" comment="xine-lib less than 1.1.2-40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043240" comment="xine-ui-32bit less than 0.99.4-84.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043241" comment="xine-ui-64bit less than 0.99.4-84.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043242" comment="xine-ui less than 0.99.4-84.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0044</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding."
	</description>
 </metadata>
<!-- 2addb930a455ee97f95fff2cffb7f6b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0045</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- 2addb930a455ee97f95fff2cffb7f6b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0046</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046" source="CVE"/>
	<description>
	Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
	</description>
 </metadata>
<!-- 2addb930a455ee97f95fff2cffb7f6b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0047</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0047" source="CVE"/>
	<description>
	CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
	</description>
 </metadata>
<!-- 2addb930a455ee97f95fff2cffb7f6b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0048</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
	</description>
 </metadata>
<!-- 2addb930a455ee97f95fff2cffb7f6b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0071</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0104</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104" source="CVE"/>
	<description>
	The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c3ff9762320df0c19879d4c3cf8f296 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043273" comment="koffice-wordprocessing less than 1.6.0-0.3"/>
	</criteria>
	<!-- 2490c08b6c9e1360fee974b09eace4b9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043293" comment="cups-client less than 1.2.7-12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043294" comment="cups-devel less than 1.2.7-12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043295" comment="cups-libs-32bit less than 1.2.7-12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043296" comment="cups-libs-64bit less than 1.2.7-12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043297" comment="cups-libs less than 1.2.7-12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043298" comment="cups less than 1.2.7-12.1"/>
		</criteria>
	</criteria>
	<!-- 2df24516ab7b3919b1869119f0c9f69a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043306" comment="xpdf less than 3.01-58.1"/>
	</criteria>
	<!-- 71f1795bf32d0f01a4b0e5c6e0bd1b8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043315" comment="gpdf less than 2.10.0-82.1"/>
	</criteria>
	<!-- a3b68e92a025908f5fb9487740655b01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043319" comment="poppler-devel less than 0.5.4-33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043320" comment="poppler less than 0.5.4-33.1"/>
		</criteria>
	</criteria>
	<!-- b9aa0d53a31836605ebeaaf2c028481d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043323" comment="xpdf-tools less than 3.01-58.1"/>
	</criteria>
	<!-- f0651bebc90c701b274fadec579c55c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043327" comment="koffice-wordprocessing less than 1.6.0-30.1"/>
	</criteria>
	<!-- f9f4c70f122df7403f38b4df40a3953a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043333" comment="kdegraphics3-pdf less than 3.5.5-43.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0126</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0126" source="CVE"/>
	<description>
	Heap-based buffer overflow in Opera 9.02 allows remote attackers to execute arbitrary code via a JPEG file with an invalid number of index bytes in the Define Huffman Table (DHT) marker.
	</description>
 </metadata>
<!-- c769c83077d71ec8cafd1f72d561acd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043336" comment="opera less than 9.10-3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0127</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0127" source="CVE"/>
	<description>
	The Javascript SVG support in Opera before 9.10 does not properly validate object types in a createSVGTransformFromMatrix request, which allows remote attackers to execute arbitrary code via JavaScript code that uses an invalid object in this request that causes a controlled pointer to be referenced during the virtual function call.
	</description>
 </metadata>
<!-- c769c83077d71ec8cafd1f72d561acd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043336" comment="opera less than 9.10-3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0157</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0157" source="CVE"/>
	<description>
	Array index error in the uri_lookup function in the URI parser for neon 0.26.0 to 0.26.2, possibly only on 64-bit platforms, allows remote malicious servers to cause a denial of service (crash) via a URI with non-ASCII characters, which triggers a buffer under-read due to a type conversion error that generates a negative index.
	</description>
 </metadata>
<!-- b70e9dd7ef2a93e94b266281fdcb63e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043337" comment="neon-32bit less than 0.26.1-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043338" comment="neon-64bit less than 0.26.1-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043339" comment="neon less than 0.26.1-26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0177</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0177" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the AJAX module in MediaWiki before 1.6.9, 1.7 before 1.7.2, 1.8 before 1.8.3, and 1.9 before 1.9.0rc2, when wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- aed51d2c59f15572751f2b7edd98a940 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043340" comment="mediawiki less than 1.8.2-0.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0235</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235" source="CVE"/>
	<description>
	Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.
	</description>
 </metadata>
<!-- 45feb6ff0a67124b6ebb5e559077eb58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043348" comment="libgtop-32bit less than 2.14.4-28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043349" comment="libgtop-64bit less than 2.14.4-28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043350" comment="libgtop-devel less than 2.14.4-28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043351" comment="libgtop less than 2.14.4-28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0238</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238" source="CVE"/>
	<description>
	Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.
	</description>
 </metadata>
<!-- 04fe22a2671e6cc4ada94b544b04c3f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043039" comment="OpenOffice_org-gnome less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043040" comment="OpenOffice_org-kde less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043041" comment="OpenOffice_org-mono less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043042" comment="OpenOffice_org-officebean less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043043" comment="OpenOffice_org less than 2.0.4-38.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0239</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239" source="CVE"/>
	<description>
	OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.
	</description>
 </metadata>
<!-- 04fe22a2671e6cc4ada94b544b04c3f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043039" comment="OpenOffice_org-gnome less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043040" comment="OpenOffice_org-kde less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043041" comment="OpenOffice_org-mono less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043042" comment="OpenOffice_org-officebean less than 2.0.4-38.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043043" comment="OpenOffice_org less than 2.0.4-38.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0242</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0242" source="CVE"/>
	<description>
	The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 97d2f57eeb5ea3e9fbc99967a482d8fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043380" comment="libqt4-devel less than 4.2.1-20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043381" comment="libqt4-x11 less than 4.2.1-20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043382" comment="libqt4 less than 4.2.1-20"/>
		</criteria>
	</criteria>
	<!-- b53f06d705178fc45238dc57fdc17ec4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043390" comment="qt3-32bit less than 3.3.7-14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043391" comment="qt3-64bit less than 3.3.7-14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043392" comment="qt3-devel-32bit less than 3.3.7-14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043393" comment="qt3-devel-64bit less than 3.3.7-14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043394" comment="qt3-devel less than 3.3.7-14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043395" comment="qt3-static less than 3.3.7-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043396" comment="qt3 less than 3.3.7-14"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0243</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243" source="CVE"/>
	<description>
	Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dc9b3d1f7716202e1b0bd73b9114811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043419" comment="java-1_4_2-sun-alsa less than 1.4.2_update13-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043420" comment="java-1_4_2-sun-devel less than 1.4.2_update13-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043421" comment="java-1_4_2-sun-jdbc less than 1.4.2_update13-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043422" comment="java-1_4_2-sun-plugin less than 1.4.2_update13-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043423" comment="java-1_4_2-sun less than 1.4.2_update13-3.1"/>
		</criteria>
	</criteria>
	<!-- 3449d7057b85fbd5f4719baedcc1b788 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043437" comment="java-1_5_0-sun-alsa less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043438" comment="java-1_5_0-sun-demo less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043439" comment="java-1_5_0-sun-devel less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043440" comment="java-1_5_0-sun-jdbc less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043441" comment="java-1_5_0-sun-plugin less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043442" comment="java-1_5_0-sun-src less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043443" comment="java-1_5_0-sun less than 1.5.0_update12-3.1"/>
		</criteria>
	</criteria>
	<!-- 763c0f1b27d1bbdb3b1a69f025f3c5ba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043445" comment="java-1_5_0-sun-alsa less than 1.5.0_update10-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043446" comment="java-1_5_0-sun-devel less than 1.5.0_update10-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043447" comment="java-1_5_0-sun-jdbc less than 1.5.0_update10-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043448" comment="java-1_5_0-sun-plugin less than 1.5.0_update10-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043449" comment="java-1_5_0-sun less than 1.5.0_update10-2.1"/>
		</criteria>
	</criteria>
	<!-- 9fc2c5a4de44f225a0a6359cd98eb972 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043477" comment="java-1_4_2-sun-alsa less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043478" comment="java-1_4_2-sun-demo less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043479" comment="java-1_4_2-sun-devel less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043480" comment="java-1_4_2-sun-jdbc less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043481" comment="java-1_4_2-sun-plugin less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043482" comment="java-1_4_2-sun-src less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043483" comment="java-1_4_2-sun less than 1.4.2_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0244</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0244" source="CVE"/>
	<description>
	pptpgre.c in PoPToP Point to Point Tunneling Server (pptpd) before 1.3.4 allows remote attackers to cause a denial of service (PPTP connection tear-down) via (1) GRE packets with out-of-order sequence numbers or (2) certain GRE packets that are processed using a wrong pointer and improperly dequeued.
	</description>
 </metadata>
<!-- a48abf1eae6b1b40852889a26ee27c34 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043484" comment="pptpd less than 1.3.0-25"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0245</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.
	</description>
 </metadata>
<!-- d2d70b003bfab024aedac9b80e39ac84 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043558" comment="OpenOffice_org-af less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043559" comment="OpenOffice_org-ar less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043560" comment="OpenOffice_org-ca less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043561" comment="OpenOffice_org-cs less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043562" comment="OpenOffice_org-da less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043563" comment="OpenOffice_org-de less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043564" comment="OpenOffice_org-es less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043565" comment="OpenOffice_org-fi less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043566" comment="OpenOffice_org-fr less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043567" comment="OpenOffice_org-galleries less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043568" comment="OpenOffice_org-gnome less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043569" comment="OpenOffice_org-gu-IN less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043570" comment="OpenOffice_org-hi-IN less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043571" comment="OpenOffice_org-hu less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043572" comment="OpenOffice_org-it less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043573" comment="OpenOffice_org-ja less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043574" comment="OpenOffice_org-kde less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043575" comment="OpenOffice_org-mono less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043576" comment="OpenOffice_org-nb less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043577" comment="OpenOffice_org-nl less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043578" comment="OpenOffice_org-nn less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043579" comment="OpenOffice_org-officebean less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043580" comment="OpenOffice_org-pl less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043581" comment="OpenOffice_org-pt-BR less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043582" comment="OpenOffice_org-ru less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043583" comment="OpenOffice_org-sk less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043584" comment="OpenOffice_org-sv less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043585" comment="OpenOffice_org-xh less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043586" comment="OpenOffice_org-zh-CN less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043587" comment="OpenOffice_org-zh-TW less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043588" comment="OpenOffice_org-zu less than 2.0.4-38.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043589" comment="OpenOffice_org less than 2.0.4-38.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0247</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247" source="CVE"/>
	<description>
	squid/src/ftp.c in Squid before 2.6.STABLE7 allows remote FTP servers to cause a denial of service (core dump) via crafted FTP directory listing responses, possibly related to the (1) ftpListingFinish and (2) ftpHtmlifyListEntry functions.
	</description>
 </metadata>
<!-- f004ed9ca9fc228586346655324fec57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043616" comment="squid less than 2.6.STABLE6-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0248</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248" source="CVE"/>
	<description>
	The aclMatchExternal function in Squid before 2.6.STABLE7 allows remote attackers to cause a denial of service (crash) by causing an external_acl queue overload, which triggers an infinite loop.
	</description>
 </metadata>
<!-- f004ed9ca9fc228586346655324fec57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043616" comment="squid less than 2.6.STABLE6-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0450</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7a28036e668e09bf9d469adb927ad06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043624" comment="tomcat5-admin-webapps less than 5.0.30-57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043625" comment="tomcat5-webapps less than 5.0.30-57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043626" comment="tomcat5 less than 5.0.30-57"/>
		</criteria>
	</criteria>
	<!-- d32228060c098397fae3ec1e926d3c03 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043633" comment="tomcat5-admin-webapps less than 5.0.30-55"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043634" comment="tomcat5-webapps less than 5.0.30-55"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043635" comment="tomcat5 less than 5.0.30-55"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0451</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0451" source="CVE"/>
	<description>
	Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage."
	</description>
 </metadata>
<!-- 8642f9d67571bf3d58a4861aee830fe7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043640" comment="perl-spamassassin less than 3.1.8-9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0456</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0456" source="CVE"/>
	<description>
	Unspecified vulnerability in the LLT dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
	</description>
 </metadata>
<!-- c23fd0fbcf7c9fab4fc8c0a3bb8de5f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043655" comment="wireshark-devel less than 0.99.5-5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043656" comment="wireshark less than 0.99.5-5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0457</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0457" source="CVE"/>
	<description>
	Unspecified vulnerability in the IEEE 802.11 dissector in Wireshark (formerly Ethereal) 0.10.14 through 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
	</description>
 </metadata>
<!-- c23fd0fbcf7c9fab4fc8c0a3bb8de5f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043655" comment="wireshark-devel less than 0.99.5-5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043656" comment="wireshark less than 0.99.5-5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0458</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0458" source="CVE"/>
	<description>
	Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors, a different issue than CVE-2006-5468.
	</description>
 </metadata>
<!-- c23fd0fbcf7c9fab4fc8c0a3bb8de5f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043655" comment="wireshark-devel less than 0.99.5-5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043656" comment="wireshark less than 0.99.5-5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0459</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0459" source="CVE"/>
	<description>
	packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
	</description>
 </metadata>
<!-- c23fd0fbcf7c9fab4fc8c0a3bb8de5f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043655" comment="wireshark-devel less than 0.99.5-5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043656" comment="wireshark less than 0.99.5-5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0460</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460" source="CVE"/>
	<description>
	Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations."
	</description>
 </metadata>
<!-- 46c4c6c95953655c3565b785bcc4d4c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043657" comment="ulogd less than 1.23-42.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0469</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0469" source="CVE"/>
	<description>
	The extract_files function in installer.rb in RubyGems before 0.9.1 does not check whether files exist before overwriting them, which allows user-assisted remote attackers to overwrite arbitrary files, cause a denial of service, or execute arbitrary code via crafted GEM packages.
	</description>
 </metadata>
<!-- c1662a1ab1748a9425d0d104bc886a02 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034072" comment="rubygems less than 0.9.2-4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0475</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in utilities/smb4k_*.cpp in Smb4K before 0.8.0 allow local users, when present on the Smb4K sudoers list, to gain privileges via unspecified vectors related to the args variable and unspecified other variables, in conjunction with the sudo configuration.
	</description>
 </metadata>
<!-- 432feb0280d4db322f8b9f4627f9b687 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043661" comment="smb4k less than 0.7.5-14.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0493</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493" source="CVE"/>
	<description>
	Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch context."
	</description>
 </metadata>
<!-- a82f79aaf62e05d4ca157a3055943e01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043664" comment="bind-libs-32bit less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043665" comment="bind-libs-64bit less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043666" comment="bind-libs less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043668" comment="bind-utils less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043669" comment="bind less than 9.3.2-56.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0494</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494" source="CVE"/>
	<description>
	ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the "DNSSEC Validation" vulnerability.
	</description>
 </metadata>
<!-- a82f79aaf62e05d4ca157a3055943e01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043664" comment="bind-libs-32bit less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043665" comment="bind-libs-64bit less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043666" comment="bind-libs less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043668" comment="bind-utils less than 9.3.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043669" comment="bind less than 9.3.2-56.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0537</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537" source="CVE"/>
	<description>
	The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
	</description>
 </metadata>
<!-- a768cac97f90a815e00783780d7c335d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043688" comment="kdelibs3-32bit less than 3.5.5-45.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043689" comment="kdelibs3-64bit less than 3.5.5-45.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043690" comment="kdelibs3-devel less than 3.5.5-45.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043691" comment="kdelibs3 less than 3.5.5-45.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0555</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555" source="CVE"/>
	<description>
	PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.
	</description>
 </metadata>
<!-- 546c274b45ccb193df43d18463a37ffa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043714" comment="postgresql-contrib less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043715" comment="postgresql-devel less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043716" comment="postgresql-docs less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043717" comment="postgresql-libs-32bit less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043718" comment="postgresql-libs-64bit less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043719" comment="postgresql-libs less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043720" comment="postgresql-pl less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043721" comment="postgresql-server less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043722" comment="postgresql less than 8.1.9-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0556</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556" source="CVE"/>
	<description>
	The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a "previously made query plan," which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an "ALTER COLUMN TYPE" SQL statement, which can be leveraged to read arbitrary memory from the server.
	</description>
 </metadata>
<!-- 546c274b45ccb193df43d18463a37ffa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043714" comment="postgresql-contrib less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043715" comment="postgresql-devel less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043716" comment="postgresql-docs less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043717" comment="postgresql-libs-32bit less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043718" comment="postgresql-libs-64bit less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043719" comment="postgresql-libs less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043720" comment="postgresql-pl less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043721" comment="postgresql-server less than 8.1.9-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043722" comment="postgresql less than 8.1.9-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0619</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0619" source="CVE"/>
	<description>
	chmlib before 0.39 allows user-assisted remote attackers to execute arbitrary code via a crafted page block length in a CHM file, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 64779d4a3338c751fc1562f3b4625e49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043734" comment="kchmviewer less than 2.6-40.1"/>
	</criteria>
	<!-- eef497ead852b40d4cd60861dad220a4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043735" comment="chmlib-devel less than 0.39-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043736" comment="chmlib less than 0.39-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0653</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0653" source="CVE"/>
	<description>
	Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption.
	</description>
 </metadata>
<!-- 809ac67b57554f30e9d4136a257eecb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043747" comment="xmms-devel less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043748" comment="xmms-lib-32bit less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043749" comment="xmms-lib-64bit less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043750" comment="xmms-lib less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043751" comment="xmms less than 1.2.10-133"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0654</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0654" source="CVE"/>
	<description>
	Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 809ac67b57554f30e9d4136a257eecb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043747" comment="xmms-devel less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043748" comment="xmms-lib-32bit less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043749" comment="xmms-lib-64bit less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043750" comment="xmms-lib less than 1.2.10-133"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043751" comment="xmms less than 1.2.10-133"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0770</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0770" source="CVE"/>
	<description>
	Buffer overflow in GraphicsMagick and ImageMagick allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c. NOTE: this issue is due to an incomplete patch for CVE-2006-5456.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38fc0612e54f79dd4092c3f4ba06d4ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042205" comment="GraphicsMagick-c++-devel less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042206" comment="GraphicsMagick-c++ less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042207" comment="GraphicsMagick-devel less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042208" comment="GraphicsMagick less than 1.1.7-35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042209" comment="perl-GraphicsMagick less than 1.1.7-35.1"/>
		</criteria>
	</criteria>
	<!-- 7542242c83690883b3dc5bb6629bcd84 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042228" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042229" comment="ImageMagick-Magick++ less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042230" comment="ImageMagick-devel less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042231" comment="ImageMagick less than 6.3.0.0-27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042232" comment="perl-PerlMagick less than 6.3.0.0-27.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0772</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0772" source="CVE"/>
	<description>
	The Linux kernel 2.6.13 and other versions before 2.6.20.1 allows remote attackers to cause a denial of service (oops) via a crafted NFSACL 2 ACCESS request that triggers a free of an incorrect pointer.
	</description>
 </metadata>
<!-- c1105207e27fe2ea07c62b7c1f2c7673 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042416" comment="kernel-bigsmp less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042417" comment="kernel-default less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042418" comment="kernel-iseries64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042419" comment="kernel-ppc64 less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042420" comment="kernel-source less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042421" comment="kernel-syms less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042422" comment="kernel-xen less than 2.6.18.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042423" comment="kernel-xenpae less than 2.6.18.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0775</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 9bff634d328ed38e2d8e19d2f47d0c68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043213" comment="MozillaThunderbird-translations less than 1.5.0.10-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043212" comment="MozillaThunderbird less than 1.5.0.10-1.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0776</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776" source="CVE"/>
	<description>
	Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 9bff634d328ed38e2d8e19d2f47d0c68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043213" comment="MozillaThunderbird-translations less than 1.5.0.10-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043212" comment="MozillaThunderbird less than 1.5.0.10-1.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0777</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- 9bff634d328ed38e2d8e19d2f47d0c68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043213" comment="MozillaThunderbird-translations less than 1.5.0.10-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043212" comment="MozillaThunderbird less than 1.5.0.10-1.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0778</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778" source="CVE"/>
	<description>
	The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0779</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0780</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780" source="CVE"/>
	<description>
	browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0800</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800" source="CVE"/>
	<description>
	Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0855</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855" source="CVE"/>
	<description>
	Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.
	</description>
 </metadata>
<!-- 4348ace2df45c0d3440cc903988bbff3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043805" comment="unrar less than 3.60.8-21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0897</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897" source="CVE"/>
	<description>
	Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.
	</description>
 </metadata>
<!-- 6dbaa33e357785be5b4d6124113eb39f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033367" comment="clamav less than 0.90-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0898</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898" source="CVE"/>
	<description>
	Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.
	</description>
 </metadata>
<!-- 6dbaa33e357785be5b4d6124113eb39f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033367" comment="clamav less than 0.90-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0906</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906" source="CVE"/>
	<description>
	Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions.  NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885).  NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 172a2f24d734d56059254d4fed3572f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
		</criteria>
	</criteria>
	<!-- f739f79e82da704f5b8af50d3db7cb44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0907</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907" source="CVE"/>
	<description>
	Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.
	</description>
 </metadata>
<!-- f739f79e82da704f5b8af50d3db7cb44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0908</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908" source="CVE"/>
	<description>
	The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.
	</description>
 </metadata>
<!-- f739f79e82da704f5b8af50d3db7cb44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0909</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.
	</description>
 </metadata>
<!-- f739f79e82da704f5b8af50d3db7cb44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0910</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors.
	</description>
 </metadata>
<!-- f739f79e82da704f5b8af50d3db7cb44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0911</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911" source="CVE"/>
	<description>
	Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash).
	</description>
 </metadata>
<!-- f739f79e82da704f5b8af50d3db7cb44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042813" comment="apache2-mod_php5 less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042814" comment="php5-bcmath less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042815" comment="php5-curl less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042816" comment="php5-dba less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042817" comment="php5-devel less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042818" comment="php5-dom less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042819" comment="php5-exif less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042820" comment="php5-fastcgi less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042821" comment="php5-ftp less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042822" comment="php5-gd less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042823" comment="php5-iconv less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042824" comment="php5-imap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042825" comment="php5-ldap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042826" comment="php5-mbstring less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042827" comment="php5-mhash less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042828" comment="php5-mysql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042829" comment="php5-odbc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042830" comment="php5-pear less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042831" comment="php5-pgsql less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042832" comment="php5-soap less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042833" comment="php5-sysvmsg less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042834" comment="php5-sysvshm less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042835" comment="php5-wddx less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042836" comment="php5-xmlrpc less than 5.2.0-12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042837" comment="php5-zip less than 5.2.0-12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0956</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956" source="CVE"/>
	<description>
	The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
	</description>
 </metadata>
<!-- 9ca55749656030f31d5abe180f9a6b36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043952" comment="krb5-apps-servers less than 1.5.1-23.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0957</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957" source="CVE"/>
	<description>
	Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
	</description>
 </metadata>
<!-- 21c49ad905aa0f7f69219cda07331da7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043968" comment="krb5-32bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043969" comment="krb5-64bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043970" comment="krb5-devel-32bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043971" comment="krb5-devel-64bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043972" comment="krb5-devel less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043973" comment="krb5-server less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043974" comment="krb5 less than 1.5.1-23.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0981</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981" source="CVE"/>
	<description>
	Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0988</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988" source="CVE"/>
	<description>
	The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0995</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 ignores trailing invalid HTML characters in attribute names, which allows remote attackers to bypass content filters that use regular expressions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0996</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996" source="CVE"/>
	<description>
	The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ad7d970b51ed496d17a2cd4cf3de73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042633" comment="seamonkey-dom-inspector less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042634" comment="seamonkey-irc less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042635" comment="seamonkey-mail less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042636" comment="seamonkey-spellchecker less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042637" comment="seamonkey-venkman less than 1.1.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042638" comment="seamonkey less than 1.1.1-0.1"/>
		</criteria>
	</criteria>
	<!-- f74da2d6a5cd047496433628f0c79707 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042657" comment="MozillaFirefox-translations less than 2.0.0.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042658" comment="MozillaFirefox less than 2.0.0.2-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1000</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1000" source="CVE"/>
	<description>
	The ipv6_getsockopt_sticky function in net/ipv6/ipv6_sockglue.c in the Linux kernel before 2.6.20.2 allows local users to read arbitrary kernel memory via certain getsockopt calls that trigger a NULL dereference.
	</description>
 </metadata>
<!-- a123e6aeb67ec727c137028128410581 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044283" comment="kernel-bigsmp less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044284" comment="kernel-default less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044285" comment="kernel-iseries64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044286" comment="kernel-ppc64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044287" comment="kernel-source less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044288" comment="kernel-syms less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044289" comment="kernel-xen less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044290" comment="kernel-xenpae less than 2.6.18.8-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1001</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1002</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1002" source="CVE"/>
	<description>
	Format string vulnerability in the write_html function in calendar/gui/e-cal-component-memo-preview.c in Evolution Shared Memo 2.8.2.1, and possibly earlier versions, allows user-assisted remote attackers to execute arbitrary code via format specifiers in the categories of a crafted shared memo.
	</description>
 </metadata>
<!-- 956a848124b324a9327d138854ad59ad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044294" comment="evolution-devel less than 2.8.2-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044295" comment="evolution-pilot less than 2.8.2-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044296" comment="evolution less than 2.8.2-7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1003</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003" source="CVE"/>
	<description>
	Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7a7397d31e5d4741c7e4f70dcf9fdf0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044315" comment="xorg-x11-Xvnc less than 7.1-33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044316" comment="xorg-x11-libX11-32bit less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044317" comment="xorg-x11-libX11-64bit less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044318" comment="xorg-x11-libX11 less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044319" comment="xorg-x11-libs-32bit less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044320" comment="xorg-x11-libs-64bit less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044321" comment="xorg-x11-libs less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044322" comment="xorg-x11-server less than 7.2-30.6"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044336" comment="xgl less than cvs_060522-42"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1006</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1006" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the gm_main_window_flash_message function in Ekiga before 2.0.5 allow attackers to cause a denial of service and possibly execute arbitrary code via a crafted Q.931 SETUP packet.
	</description>
 </metadata>
<!-- 3a86588bdf6b5e8e610c60f1b7698968 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044337" comment="ekiga less than 2.0.3-43.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1095</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1115</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1115" source="CVE"/>
	<description>
	The child frames in Opera 9 before 9.20 inherit the default charset from the parent window when a charset is not specified in an HTTP Content-Type header or META tag, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
	</description>
 </metadata>
<!-- 564d78497497c72bda3befc200dcfa97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044342" comment="opera less than 9.20-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1216</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216" source="CVE"/>
	<description>
	Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
	</description>
 </metadata>
<!-- 21c49ad905aa0f7f69219cda07331da7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043968" comment="krb5-32bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043969" comment="krb5-64bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043970" comment="krb5-devel-32bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043971" comment="krb5-devel-64bit less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043972" comment="krb5-devel less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043973" comment="krb5-server less than 1.5.1-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043974" comment="krb5 less than 1.5.1-23.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1246</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246" source="CVE"/>
	<description>
	The DMO_VideoDecoder_Open function in loader/dmo/DMO_VideoDecoder.c in MPlayer 1.0rc1 and earlier, as used in xine-lib, does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code, a different vulnerability than CVE-2007-1387.
	</description>
 </metadata>
<!-- 66740bc1bf49aa9279197ce41bf4c8eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044353" comment="xine-lib-32bit less than 1.1.2-40.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044354" comment="xine-lib-64bit less than 1.1.2-40.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044355" comment="xine-lib less than 1.1.2-40.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1262</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1262" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c8f3fb7280833b546c12be817fc3856 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044361" comment="squirrelmail less than 1.4.9a-2.6"/>
	</criteria>
	<!-- 5d11b07c18bac92eaa83de98c93dfaeb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044364" comment="squirrelmail less than 1.4.9a-2.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1263</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263" source="CVE"/>
	<description>
	GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
	</description>
 </metadata>
<!-- 323f23244f7c638bf1cdb7f8869c8e71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044367" comment="gpg less than 1.4.5-24.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1285</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285" source="CVE"/>
	<description>
	The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1306</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306" source="CVE"/>
	<description>
	Asterisk 1.4 before 1.4.1 and 1.2 before 1.2.16 allows remote attackers to cause a denial of service (crash) by sending a Session Initiation Protocol (SIP) packet without a URI and SIP-version header, which results in a NULL pointer dereference.
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1325</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1325" source="CVE"/>
	<description>
	The PMA_ArrayWalkRecursive function in libraries/common.lib.php in phpMyAdmin before 2.10.0.2 does not limit recursion on arrays provided by users, which allows context-dependent attackers to cause a denial of service (web server crash) via an array with many dimensions.  NOTE: it could be argued that this vulnerability is caused by a problem in PHP (CVE-2006-1549) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpMyAdmin.
	</description>
 </metadata>
<!-- 5eb111738f2a9891494f32257a9c6039 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044430" comment="phpMyAdmin less than 2.9.1.1-5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1351</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351" source="CVE"/>
	<description>
	Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 896e048a3749eb871f97e403b9765a89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044444" comment="freetype2-32bit less than 2.2.1.20061027-13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044445" comment="freetype2-64bit less than 2.2.1.20061027-13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044446" comment="freetype2-devel-32bit less than 2.2.1.20061027-13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044447" comment="freetype2-devel-64bit less than 2.2.1.20061027-13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044448" comment="freetype2-devel less than 2.2.1.20061027-13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044449" comment="freetype2 less than 2.2.1.20061027-13"/>
		</criteria>
	</criteria>
	<!-- a7a7397d31e5d4741c7e4f70dcf9fdf0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044315" comment="xorg-x11-Xvnc less than 7.1-33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044316" comment="xorg-x11-libX11-32bit less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044317" comment="xorg-x11-libX11-64bit less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044318" comment="xorg-x11-libX11 less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044319" comment="xorg-x11-libs-32bit less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044320" comment="xorg-x11-libs-64bit less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044321" comment="xorg-x11-libs less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044322" comment="xorg-x11-server less than 7.2-30.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1352</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352" source="CVE"/>
	<description>
	Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
	</description>
 </metadata>
<!-- a7a7397d31e5d4741c7e4f70dcf9fdf0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044315" comment="xorg-x11-Xvnc less than 7.1-33.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044316" comment="xorg-x11-libX11-32bit less than 7.2-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044317" comment="xorg-x11-libX11-64bit less than 7.2-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044318" comment="xorg-x11-libX11 less than 7.2-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044319" comment="xorg-x11-libs-32bit less than 7.2-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044320" comment="xorg-x11-libs-64bit less than 7.2-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044321" comment="xorg-x11-libs less than 7.2-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044322" comment="xorg-x11-server less than 7.2-30.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1357</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1357" source="CVE"/>
	<description>
	The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum.
	</description>
 </metadata>
<!-- a123e6aeb67ec727c137028128410581 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044283" comment="kernel-bigsmp less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044284" comment="kernel-default less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044285" comment="kernel-iseries64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044286" comment="kernel-ppc64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044287" comment="kernel-source less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044288" comment="kernel-syms less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044289" comment="kernel-xen less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044290" comment="kernel-xenpae less than 2.6.18.8-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1362</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1375</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375" source="CVE"/>
	<description>
	Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1376</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376" source="CVE"/>
	<description>
	The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1380</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380" source="CVE"/>
	<description>
	The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1384</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1384" source="CVE"/>
	<description>
	Directory traversal vulnerability in torrent.cpp in KTorrent before 2.1.2 allows remote attackers to overwrite arbitrary files via ".." sequences in a torrent filename.
	</description>
 </metadata>
<!-- a40e8493c655859108faa6b12de5bcf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044502" comment="ktorrent less than 2.0.3-30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1385</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1385" source="CVE"/>
	<description>
	chunkcounter.cpp in KTorrent before 2.1.2 allows remote attackers to cause a denial of service (crash) and heap corruption via a negative or large idx value.
	</description>
 </metadata>
<!-- a40e8493c655859108faa6b12de5bcf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044502" comment="ktorrent less than 2.0.3-30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1388</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1388" source="CVE"/>
	<description>
	The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel before 2.6.20, and possibly other versions, allows local users to cause a denial of service (oops) by calling setsockopt with the IPV6_RTHDR option name and possibly a zero option length or invalid option value, which triggers a NULL pointer dereference.
	</description>
 </metadata>
<!-- a123e6aeb67ec727c137028128410581 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044283" comment="kernel-bigsmp less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044284" comment="kernel-default less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044285" comment="kernel-iseries64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044286" comment="kernel-ppc64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044287" comment="kernel-source less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044288" comment="kernel-syms less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044289" comment="kernel-xen less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044290" comment="kernel-xenpae less than 2.6.18.8-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1396</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1396" source="CVE"/>
	<description>
	The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact.  NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1429</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1429" source="CVE"/>
	<description>
	Multiple PHP remote file inclusion vulnerabilities in Moodle 1.7.1 allow remote attackers to execute arbitrary PHP code via a URL in the cmd parameter to (1) admin/utfdbmigrate.php or (2) filter.php.
	</description>
 </metadata>
<!-- 1b700325d00415ae866c6fcf4df0f6c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044503" comment="moodle-af less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044504" comment="moodle-ar less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044505" comment="moodle-be less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044506" comment="moodle-bg less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044507" comment="moodle-bs less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044508" comment="moodle-ca less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044509" comment="moodle-cs less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044510" comment="moodle-da less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044511" comment="moodle-de less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044512" comment="moodle-el less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044513" comment="moodle-es less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044514" comment="moodle-et less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044515" comment="moodle-eu less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044516" comment="moodle-fa less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044517" comment="moodle-fi less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044518" comment="moodle-fr less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044519" comment="moodle-ga less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044520" comment="moodle-gl less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044521" comment="moodle-he less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044522" comment="moodle-hi less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044523" comment="moodle-hr less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044524" comment="moodle-hu less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044525" comment="moodle-id less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044526" comment="moodle-is less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044527" comment="moodle-it less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044528" comment="moodle-ja less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044529" comment="moodle-ka less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044530" comment="moodle-km less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044531" comment="moodle-kn less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044532" comment="moodle-ko less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044533" comment="moodle-lt less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044534" comment="moodle-lv less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044535" comment="moodle-mi_tn less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044536" comment="moodle-ms less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044537" comment="moodle-nl less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044538" comment="moodle-nn less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044539" comment="moodle-no less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044540" comment="moodle-pl less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044541" comment="moodle-pt less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044542" comment="moodle-ro less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044543" comment="moodle-ru less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044544" comment="moodle-sk less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044545" comment="moodle-sl less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044546" comment="moodle-so less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044547" comment="moodle-sq less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044548" comment="moodle-sr less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044549" comment="moodle-sv less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044550" comment="moodle-th less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044551" comment="moodle-tl less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044552" comment="moodle-tr less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044553" comment="moodle-uk less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044554" comment="moodle-vi less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044555" comment="moodle-zh_cn less than 1.7.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044556" comment="moodle less than 1.7.2-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1453</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1453" source="CVE"/>
	<description>
	Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1454</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1454" source="CVE"/>
	<description>
	ext/filter in PHP 5.2.0, when FILTER_SANITIZE_STRING is used with the FILTER_FLAG_STRIP_LOW flag, does not properly strip HTML tags, which allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML with a '&lt;' character followed by certain whitespace characters, which passes one filter but is collapsed into a valid tag, as demonstrated using %0b.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1460</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1460" source="CVE"/>
	<description>
	The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1461</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1461" source="CVE"/>
	<description>
	The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended directories.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1463</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463" source="CVE"/>
	<description>
	Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
	</description>
 </metadata>
<!-- e0500fceda6cb330bbba5861b24c74e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044559" comment="inkscape less than 0.44.1-26.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1464</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464" source="CVE"/>
	<description>
	Format string vulnerability in the whiteboard Jabber protocol in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- e0500fceda6cb330bbba5861b24c74e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044559" comment="inkscape less than 0.44.1-26.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1473</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1473" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in framework/NLS/NLS.php in Horde Framework before 3.1.4 RC1, when the login page contains a language selection box, allows remote attackers to inject arbitrary web script or HTML via the new_lang parameter to login.php.
	</description>
 </metadata>
<!-- e48166ef7fbe69f7424cae76f9abfa10 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044563" comment="horde less than 3.1.3-22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1484</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1484" source="CVE"/>
	<description>
	The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1496</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1496" source="CVE"/>
	<description>
	nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) bridged packets, which trigger a NULL pointer dereference.
	</description>
 </metadata>
<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1497</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1497" source="CVE"/>
	<description>
	nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments.
	</description>
 </metadata>
<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1521</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521" source="CVE"/>
	<description>
	Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1522</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1522" source="CVE"/>
	<description>
	Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1536</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536" source="CVE"/>
	<description>
	Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- c4e310b626dbbac7bc4bf80e6571b3a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044574" comment="file-32bit less than 4.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044575" comment="file-64bit less than 4.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044576" comment="file-devel less than 4.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044577" comment="file less than 4.17-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1558</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558" source="CVE"/>
	<description>
	The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- f56b0a3ad8c018344fd3e90dc32e6970 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044582" comment="mutt less than 1.5.13-34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1560</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1560" source="CVE"/>
	<description>
	The clientProcessRequest() function in src/client_side.c in Squid 2.6 before 2.6.STABLE12 allows remote attackers to cause a denial of service (daemon crash) via crafted TRACE requests that trigger an assertion error.
	</description>
 </metadata>
<!-- 4544c78ee7f63c06888ffedb5acb8015 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044583" comment="squid less than 2.6.STABLE6-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1561</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561" source="CVE"/>
	<description>
	The channel driver in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP INVITE message with an SDP containing one valid and one invalid IP address.
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1562</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1562" source="CVE"/>
	<description>
	The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1563</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1563" source="CVE"/>
	<description>
	The FTP protocol implementation in Opera 9.10 allows remote attackers to allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
<!-- 564d78497497c72bda3befc200dcfa97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044342" comment="opera less than 9.20-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1564</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1564" source="CVE"/>
	<description>
	The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
<!-- a768cac97f90a815e00783780d7c335d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043688" comment="kdelibs3-32bit less than 3.5.5-45.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043689" comment="kdelibs3-64bit less than 3.5.5-45.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043690" comment="kdelibs3-devel less than 3.5.5-45.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043691" comment="kdelibs3 less than 3.5.5-45.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1583</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583" source="CVE"/>
	<description>
	The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1592</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592" source="CVE"/>
	<description>
	net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.
	</description>
 </metadata>
<!-- a123e6aeb67ec727c137028128410581 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044283" comment="kernel-bigsmp less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044284" comment="kernel-default less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044285" comment="kernel-iseries64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044286" comment="kernel-ppc64 less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044287" comment="kernel-source less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044288" comment="kernel-syms less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044289" comment="kernel-xen less than 2.6.18.8-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044290" comment="kernel-xenpae less than 2.6.18.8-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1594</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594" source="CVE"/>
	<description>
	The handle_response function in chan_sip.c in Asterisk before 1.2.17 and 1.4.x before 1.4.2 allows remote attackers to cause a denial of service (crash) via a SIP Response code 0 in a SIP packet.
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1595</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1595" source="CVE"/>
	<description>
	The Asterisk Extension Language (AEL) in pbx/pbx_ael.c in Asterisk does not properly generate extensions, which allows remote attackers to execute arbitrary extensions and have an unknown impact by specifying an invalid extension in a certain form.
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1659</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
	</description>
 </metadata>
<!-- d0a8af02d8db646a50f7e3c6c4339865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044589" comment="pcre-32bit less than 6.7-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044590" comment="pcre-64bit less than 6.7-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044591" comment="pcre-devel less than 6.7-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044592" comment="pcre less than 6.7-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1660</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- d0a8af02d8db646a50f7e3c6c4339865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044589" comment="pcre-32bit less than 6.7-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044590" comment="pcre-64bit less than 6.7-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044591" comment="pcre-devel less than 6.7-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044592" comment="pcre less than 6.7-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1667</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667" source="CVE"/>
	<description>
	Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2265516cfb3ec31f9333031dfd6daa35 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044606" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044607" comment="ImageMagick-Magick++ less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044608" comment="ImageMagick-devel less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044609" comment="ImageMagick less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044610" comment="perl-PerlMagick less than 6.3.0.0-27.4"/>
		</criteria>
	</criteria>
	<!-- 6c596e6dba53b28168fbd2212ebb0916 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044616" comment="GraphicsMagick-c++-devel less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044617" comment="GraphicsMagick-c++ less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044618" comment="GraphicsMagick-devel less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044619" comment="GraphicsMagick less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044620" comment="perl-GraphicsMagick less than 1.1.7-35.3"/>
		</criteria>
	</criteria>
	<!-- a7a7397d31e5d4741c7e4f70dcf9fdf0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044315" comment="xorg-x11-Xvnc less than 7.1-33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044316" comment="xorg-x11-libX11-32bit less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044317" comment="xorg-x11-libX11-64bit less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044318" comment="xorg-x11-libX11 less than 7.2-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044319" comment="xorg-x11-libs-32bit less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044320" comment="xorg-x11-libs-64bit less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044321" comment="xorg-x11-libs less than 7.2-21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044322" comment="xorg-x11-server less than 7.2-30.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1700</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700" source="CVE"/>
	<description>
	The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1717</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1717" source="CVE"/>
	<description>
	The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages.  NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1718</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718" source="CVE"/>
	<description>
	CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1745</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745" source="CVE"/>
	<description>
	The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 06136c74f8b7d7b639c421cdd70ea1ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033476" comment="clamav less than 0.90.2-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1797</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797" source="CVE"/>
	<description>
	Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2265516cfb3ec31f9333031dfd6daa35 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044606" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044607" comment="ImageMagick-Magick++ less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044608" comment="ImageMagick-devel less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044609" comment="ImageMagick less than 6.3.0.0-27.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044610" comment="perl-PerlMagick less than 6.3.0.0-27.4"/>
		</criteria>
	</criteria>
	<!-- 6c596e6dba53b28168fbd2212ebb0916 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044616" comment="GraphicsMagick-c++-devel less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044617" comment="GraphicsMagick-c++ less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044618" comment="GraphicsMagick-devel less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044619" comment="GraphicsMagick less than 1.1.7-35.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044620" comment="perl-GraphicsMagick less than 1.1.7-35.3"/>
		</criteria>
	</criteria>
	<!-- 920d7fa41c55563cf688c7a871753b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044632" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044633" comment="ImageMagick-Magick++ less than 6.3.0.0-27.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044634" comment="ImageMagick-devel less than 6.3.0.0-27.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044635" comment="ImageMagick less than 6.3.0.0-27.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044636" comment="perl-PerlMagick less than 6.3.0.0-27.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1799</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799" source="CVE"/>
	<description>
	Directory traversal vulnerability in torrent.cpp in KTorrent before 2.1.3 only checks for the ".." string, which allows remote attackers to overwrite arbitrary files via modified ".." sequences in a torrent filename, as demonstrated by "../" sequences, due to an incomplete fix for CVE-2007-1384.
	</description>
 </metadata>
<!-- a40e8493c655859108faa6b12de5bcf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044502" comment="ktorrent less than 2.0.3-30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1804</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1804" source="CVE"/>
	<description>
	PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent on TCP port 9875, which triggers a p-&gt;export assertion failure in do_read; (2) a PA_PSTREAM_DESCRIPTOR_LENGTH value of 0 sent on TCP port 9875, which triggers a length assertion failure in pa_memblock_new; or (3) an empty packet on UDP port 9875, which triggers a t assertion failure in pa_sdp_parse; and allows remote authenticated users to cause a denial of service (daemon crash) via a crafted packet on TCP port 9875 that (4) triggers a maxlength assertion failure in pa_memblockq_new, (5) triggers a size assertion failure in pa_xmalloc, or (6) plays a certain sound file.
	</description>
 </metadata>
<!-- b222008092a4213a0890fd778608c76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044642" comment="pulseaudio-devel less than 0.9.5-55.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044643" comment="pulseaudio-libs less than 0.9.5-55.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044644" comment="pulseaudio less than 0.9.5-55.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1824</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1824" source="CVE"/>
	<description>
	Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1841</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841" source="CVE"/>
	<description>
	The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.
	</description>
 </metadata>
<!-- 2dbb20a0ffffd9f699b1b8d0da52df54 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044647" comment="ipsec-tools less than 0.6.5-39"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1856</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856" source="CVE"/>
	<description>
	Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c.
	</description>
 </metadata>
<!-- c2857422a97127436f7c7c580480fe5e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038565" comment="cron less than 4.1-70"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1858</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858" source="CVE"/>
	<description>
	The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 85ad755d563e3236372e60e5c5719a6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044652" comment="apache2-mod_jk less than 4.1.30-13.6"/>
	</criteria>
	<!-- ba14ed88f8b4aa6c8eda8d351fd65b0c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044656" comment="tomcat5-admin-webapps less than 5.0.30-62"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044657" comment="tomcat5-webapps less than 5.0.30-62"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044658" comment="tomcat5 less than 5.0.30-62"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1859</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859" source="CVE"/>
	<description>
	XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.
	</description>
 </metadata>
<!-- a6a615f8905946fb6660cfc9462490d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044662" comment="xscreensaver less than 5.01-16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1860</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860" source="CVE"/>
	<description>
	mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1861</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1861" source="CVE"/>
	<description>
	The nl_fib_lookup function in net/ipv4/fib_frontend.c in Linux Kernel before 2.6.20.8 allows attackers to cause a denial of service (kernel panic) via NETLINK_FIB_LOOKUP replies, which trigger infinite recursion and a stack overflow.
	</description>
 </metadata>
<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1862</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862" source="CVE"/>
	<description>
	The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042441" comment="apache2-devel less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042442" comment="apache2-doc less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042443" comment="apache2-example-pages less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042444" comment="apache2-prefork less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042445" comment="apache2-worker less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042446" comment="apache2 less than 2.2.3-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1863</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863" source="CVE"/>
	<description>
	cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042441" comment="apache2-devel less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042442" comment="apache2-doc less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042443" comment="apache2-example-pages less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042444" comment="apache2-prefork less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042445" comment="apache2-worker less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042446" comment="apache2 less than 2.2.3-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1864</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1864" source="CVE"/>
	<description>
	Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1869</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1869" source="CVE"/>
	<description>
	lighttpd 1.4.12 and 1.4.13 allows remote attackers to cause a denial of service (cpu and resource consumption) by disconnecting while lighttpd is parsing CRLF sequences, which triggers an infinite loop and file descriptor consumption.
	</description>
 </metadata>
<!-- 68f4f378130f0904d6af1782d7472ce7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044665" comment="lighttpd less than 1.4.13-41.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1870</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1870" source="CVE"/>
	<description>
	lighttpd before 1.4.14 allows attackers to cause a denial of service (crash) via a request to a file whose mtime is 0, which results in a NULL pointer dereference.
	</description>
 </metadata>
<!-- 68f4f378130f0904d6af1782d7472ce7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044665" comment="lighttpd less than 1.4.13-41.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1889</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1889" source="CVE"/>
	<description>
	Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1900</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900" source="CVE"/>
	<description>
	CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string.
	</description>
 </metadata>
<!-- 6983410f18d3b13c6e9d0ab8398b7ce6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044034" comment="apache2-mod_php5 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044035" comment="php5-bcmath less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044036" comment="php5-bz2 less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044037" comment="php5-calendar less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044038" comment="php5-ctype less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044039" comment="php5-curl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044040" comment="php5-dba less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044041" comment="php5-dbase less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044042" comment="php5-devel less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044043" comment="php5-dom less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044044" comment="php5-exif less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044045" comment="php5-fastcgi less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044046" comment="php5-ftp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044047" comment="php5-gd less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044048" comment="php5-gettext less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044049" comment="php5-gmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044050" comment="php5-hash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044051" comment="php5-iconv less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044052" comment="php5-imap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044053" comment="php5-json less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044054" comment="php5-ldap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044055" comment="php5-mbstring less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044056" comment="php5-mcrypt less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044057" comment="php5-mhash less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044058" comment="php5-mysql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044059" comment="php5-ncurses less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044060" comment="php5-odbc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044061" comment="php5-openssl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044062" comment="php5-pcntl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044063" comment="php5-pdo less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044064" comment="php5-pear less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044065" comment="php5-pgsql less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044066" comment="php5-posix less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044067" comment="php5-pspell less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044068" comment="php5-shmop less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044069" comment="php5-snmp less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044070" comment="php5-soap less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044071" comment="php5-sockets less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044072" comment="php5-sqlite less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044073" comment="php5-suhosin less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044074" comment="php5-sysvmsg less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044075" comment="php5-sysvsem less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044076" comment="php5-sysvshm less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044077" comment="php5-tidy less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044078" comment="php5-tokenizer less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044079" comment="php5-wddx less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044080" comment="php5-xmlreader less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044081" comment="php5-xmlrpc less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044082" comment="php5-xmlwriter less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044083" comment="php5-xsl less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044084" comment="php5-zip less than 5.2.0-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044085" comment="php5-zlib less than 5.2.0-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1995</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995" source="CVE"/>
	<description>
	bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.
	</description>
 </metadata>
<!-- f79d8ab001d2b0a685a155372853cc09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044671" comment="quagga-devel less than 0.98.6-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044672" comment="quagga less than 0.98.6-29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1997</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997" source="CVE"/>
	<description>
	Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 06136c74f8b7d7b639c421cdd70ea1ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033476" comment="clamav less than 0.90.2-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2022</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022" source="CVE"/>
	<description>
	Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 564d78497497c72bda3befc200dcfa97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044342" comment="opera less than 9.20-1.1"/>
	</criteria>
	<!-- 993344f570fb77d8d32ac70543dbf620 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044678" comment="flash-player less than 9.0.48.0-1.1"/>
	</criteria>
	<!-- c242d321239e36550aeac44635be6891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044687" comment="kdebase3-32bit less than 3.5.5-102.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044688" comment="kdebase3-64bit less than 3.5.5-102.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044689" comment="kdebase3 less than 3.5.5-102.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2028</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028" source="CVE"/>
	<description>
	Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
	</description>
 </metadata>
<!-- 12e92ef3b97dfba168c141199628f09d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044696" comment="freeradius-devel less than 1.1.3-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044697" comment="freeradius less than 1.1.3-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2052</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052" source="CVE"/>
	<description>
	Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
	</description>
 </metadata>
<!-- 0d7bcf5a256c1115290d6cf9572be8a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044702" comment="python-32bit less than 2.5-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044703" comment="python-64bit less than 2.5-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044704" comment="python-devel less than 2.5-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044705" comment="python less than 2.5-19.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2231</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2231" source="CVE"/>
	<description>
	Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
	</description>
 </metadata>
<!-- 53d4bb1f153e278722d2f225e098903a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044713" comment="dovecot less than 1.0.rc14-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2242</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2242" source="CVE"/>
	<description>
	The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 607087396f97a315b72b06b2f20559ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
		</criteria>
	</criteria>
	<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2292</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292" source="CVE"/>
	<description>
	CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2294</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2294" source="CVE"/>
	<description>
	The Manager Interface in Asterisk before 1.2.18 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (crash) by using MD5 authentication to authenticate a user that does not have a password defined in manager.conf, resulting in a NULL pointer dereference.
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2297</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2297" source="CVE"/>
	<description>
	The SIP channel driver (chan_sip) in Asterisk before 1.2.18 and 1.4.x before 1.4.3 does not properly parse SIP UDP packets that do not contain a valid response code, which allows remote attackers to cause a denial of service (crash).
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2356</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2356" source="CVE"/>
	<description>
	Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b2c7153f47ba002ec8f2141960297ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044742" comment="gimp-unstable less than 2.3.11-51.1"/>
	</criteria>
	<!-- 991f2060e87116136e207d9e0c1f9694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044747" comment="gimp less than 2.2.13-31"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2438</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2438" source="CVE"/>
	<description>
	The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
	</description>
 </metadata>
<!-- 18c08d8ee3f69beccf4d81410719c518 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044748" comment="gvim less than 7.0-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044749" comment="vim-enhanced less than 7.0-36"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2442</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442" source="CVE"/>
	<description>
	The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
	</description>
 </metadata>
<!-- 3fe33245262093053cbf71d16ed83064 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044764" comment="krb5-32bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044765" comment="krb5-64bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044766" comment="krb5-devel-32bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044767" comment="krb5-devel-64bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044768" comment="krb5-devel less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044769" comment="krb5-server less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044770" comment="krb5 less than 1.5.1-23.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2443</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443" source="CVE"/>
	<description>
	Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
	</description>
 </metadata>
<!-- 3fe33245262093053cbf71d16ed83064 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044764" comment="krb5-32bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044765" comment="krb5-64bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044766" comment="krb5-devel-32bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044767" comment="krb5-devel-64bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044768" comment="krb5-devel less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044769" comment="krb5-server less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044770" comment="krb5 less than 1.5.1-23.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2444</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444" source="CVE"/>
	<description>
	Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
	</description>
 </metadata>
<!-- d0d94c7849675346c28b8f2a26749d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044772" comment="libmsrpc-devel less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044773" comment="libmsrpc less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044774" comment="libsmbclient-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044775" comment="libsmbclient-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044776" comment="libsmbclient-devel less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044777" comment="libsmbclient less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044778" comment="samba-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044779" comment="samba-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044780" comment="samba-client-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044781" comment="samba-client-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044782" comment="samba-client less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044783" comment="samba-python less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044784" comment="samba-winbind-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044785" comment="samba-winbind-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044786" comment="samba-winbind less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044787" comment="samba less than 3.0.23d-19.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2445</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445" source="CVE"/>
	<description>
	The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.
	</description>
 </metadata>
<!-- 830d0e32aae7f72f52d4a8e0a7345d61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044797" comment="libpng-32bit less than 1.2.12-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044798" comment="libpng-64bit less than 1.2.12-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044799" comment="libpng-devel-32bit less than 1.2.12-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044800" comment="libpng-devel-64bit less than 1.2.12-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044801" comment="libpng-devel less than 1.2.12-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044802" comment="libpng less than 1.2.12-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2446</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).
	</description>
 </metadata>
<!-- d0d94c7849675346c28b8f2a26749d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044772" comment="libmsrpc-devel less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044773" comment="libmsrpc less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044774" comment="libsmbclient-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044775" comment="libsmbclient-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044776" comment="libsmbclient-devel less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044777" comment="libsmbclient less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044778" comment="samba-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044779" comment="samba-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044780" comment="samba-client-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044781" comment="samba-client-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044782" comment="samba-client less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044783" comment="samba-python less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044784" comment="samba-winbind-32bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044785" comment="samba-winbind-64bit less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044786" comment="samba-winbind less than 3.0.23d-19.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044787" comment="samba less than 3.0.23d-19.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2447</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447" source="CVE"/>
	<description>
	The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a6343080a79d294997de21119daffa1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044857" comment="cifs-mount less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044858" comment="ldapsmb less than 1.34b-27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044859" comment="libmsrpc-devel less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044860" comment="libmsrpc less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044861" comment="libsmbclient-32bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044862" comment="libsmbclient-64bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044863" comment="libsmbclient-devel less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044864" comment="libsmbclient less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044865" comment="samba-32bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044866" comment="samba-64bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044867" comment="samba-client-32bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044868" comment="samba-client-64bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044869" comment="samba-client less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044870" comment="samba-pdb less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044871" comment="samba-python less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044872" comment="samba-vscan less than 0.3.6b-98.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044873" comment="samba-winbind-32bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044874" comment="samba-winbind-64bit less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044875" comment="samba-winbind less than 3.0.23d-19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044876" comment="samba less than 3.0.23d-19.7"/>
		</criteria>
	</criteria>
	<!-- d0d94c7849675346c28b8f2a26749d1e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044772" comment="libmsrpc-devel less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044773" comment="libmsrpc less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044774" comment="libsmbclient-32bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044775" comment="libsmbclient-64bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044776" comment="libsmbclient-devel less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044777" comment="libsmbclient less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044778" comment="samba-32bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044779" comment="samba-64bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044780" comment="samba-client-32bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044781" comment="samba-client-64bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044782" comment="samba-client less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044783" comment="samba-python less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044784" comment="samba-winbind-32bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044785" comment="samba-winbind-64bit less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044786" comment="samba-winbind less than 3.0.23d-19.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044787" comment="samba less than 3.0.23d-19.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2449</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
	</description>
 </metadata>
<!-- ba14ed88f8b4aa6c8eda8d351fd65b0c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044656" comment="tomcat5-admin-webapps less than 5.0.30-62"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044657" comment="tomcat5-webapps less than 5.0.30-62"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044658" comment="tomcat5 less than 5.0.30-62"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2450</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
	</description>
 </metadata>
<!-- ba14ed88f8b4aa6c8eda8d351fd65b0c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044656" comment="tomcat5-admin-webapps less than 5.0.30-62"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044657" comment="tomcat5-webapps less than 5.0.30-62"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044658" comment="tomcat5 less than 5.0.30-62"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2453</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2453" source="CVE"/>
	<description>
	The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
	</description>
 </metadata>
<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2488</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2488" source="CVE"/>
	<description>
	The IAX2 channel driver (chan_iax2) in Asterisk before 20070504 does not properly null terminate data, which allows remote attackers to trigger loss of transmitted data, and possibly obtain sensitive information (memory contents) or cause a denial of service (application crash), by sending a frame that lacks a 0 byte.
	</description>
 </metadata>
<!-- e576fd67af6e913652161ec8b0b3007e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044423" comment="asterisk less than 1.2.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2500</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2500" source="CVE"/>
	<description>
	server/parser/sprite_definition.cpp in GNU Gnash (aka GNU Flash Player) 0.7.2 allows remote attackers to execute arbitrary code via a large number of SHOWFRAME elements within a DEFINESPRITE element, which triggers memory corruption and enables the attacker to call free with an arbitrary address, probably resultant from a buffer overflow.
	</description>
 </metadata>
<!-- edba43fbee0bd6b1e29db3b64db700df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044915" comment="gnash less than 0.7.1.cvs20061019-25.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2509</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509" source="CVE"/>
	<description>
	CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2510</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2510" source="CVE"/>
	<description>
	Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2511</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2511" source="CVE"/>
	<description>
	Buffer overflow in the user_filter_factory_create function in PHP before 5.2.2 has unknown impact and local attack vectors.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2525</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2525" source="CVE"/>
	<description>
	Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
	</description>
 </metadata>
<!-- 1fd4a28a21f2346d8061b360d0d66a3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044918" comment="kernel-bigsmp less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044919" comment="kernel-default less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044920" comment="kernel-iseries64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044921" comment="kernel-kdump less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044922" comment="kernel-ppc64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044923" comment="kernel-source less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044924" comment="kernel-syms less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044925" comment="kernel-xen less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044926" comment="kernel-xenpae less than 2.6.18.8-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2583</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2583" source="CVE"/>
	<description>
	The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2589</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2589" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail 1.4.0 through 1.4.9a allows remote attackers to send e-mails from arbitrary users via certain data in the SRC attribute of an IMG element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c8f3fb7280833b546c12be817fc3856 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044361" comment="squirrelmail less than 1.4.9a-2.6"/>
	</criteria>
	<!-- 5d11b07c18bac92eaa83de98c93dfaeb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044364" comment="squirrelmail less than 1.4.9a-2.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2645</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645" source="CVE"/>
	<description>
	Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f199d4f79e3f0877b4206e13f5a5f12 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044965" comment="libexif-32bit less than 0.6.14-20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044966" comment="libexif-64bit less than 0.6.14-20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044967" comment="libexif less than 0.6.14-20"/>
		</criteria>
	</criteria>
	<!-- 48458044740c6f291fda6e5530dc73fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044969" comment="libexif5 less than 0.5.12-39"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2650</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650" source="CVE"/>
	<description>
	The OLE2 parser in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service (resource consumption) via an OLE2 file with (1) a large property size or (2) a loop in the FAT file block chain that triggers an infinite loop, as demonstrated via a crafted DOC file.
	</description>
 </metadata>
<!-- 938fd48ea2875f7556f782b968d1ca3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044974" comment="clamav-db less than 0.90.3-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2654</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2654" source="CVE"/>
	<description>
	xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.
	</description>
 </metadata>
<!-- 432b1c4f503569b09ac847541be60b90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044978" comment="xfsdump less than 2.2.42_1-12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2691</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2691" source="CVE"/>
	<description>
	MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2692</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2692" source="CVE"/>
	<description>
	The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2721</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721" source="CVE"/>
	<description>
	The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bbe8376370b954307e807f6b273d3ba7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044994" comment="jasper less than 1.701.0-38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044995" comment="libjasper-32bit less than 1.701.0-38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044996" comment="libjasper-64bit less than 1.701.0-38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044997" comment="libjasper less than 1.701.0-38"/>
		</criteria>
	</criteria>
	<!-- f132136b0b7c36a77994eb1dfaf5417a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045005" comment="libnetpbm-32bit less than 1.0.0-678"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045006" comment="libnetpbm-64bit less than 1.0.0-678"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045007" comment="libnetpbm less than 1.0.0-678"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045008" comment="netpbm less than 10.26.22-35"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2727</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2727" source="CVE"/>
	<description>
	The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys.
	</description>
 </metadata>
<!-- badf637480fa27397801dc70a7e80ee1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2728</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2728" source="CVE"/>
	<description>
	The soap extension in PHP calls php_rand_r with an uninitialized seed variable, which has unknown impact and attack vectors, a related issue to the mcrypt_create_iv issue covered by CVE-2007-2727.
	</description>
 </metadata>
<!-- badf637480fa27397801dc70a7e80ee1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2741</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2741" source="CVE"/>
	<description>
	Stack-based buffer overflow in Little CMS (lcms) before 1.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ICC profile in a JPG file.
	</description>
 </metadata>
<!-- 5c50785a43b3577d8589c734c514d0bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045227" comment="liblcms-32bit less than 1.15-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045228" comment="liblcms-64bit less than 1.15-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045229" comment="liblcms-devel-32bit less than 1.15-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045230" comment="liblcms-devel-64bit less than 1.15-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045231" comment="liblcms-devel less than 1.15-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045232" comment="liblcms less than 1.15-32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2748</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2748" source="CVE"/>
	<description>
	The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.
	</description>
 </metadata>
<!-- badf637480fa27397801dc70a7e80ee1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2754</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754" source="CVE"/>
	<description>
	Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
	</description>
 </metadata>
<!-- f76419434eaea2afdbf4837862aba409 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045250" comment="freetype2-32bit less than 2.2.1.20061027-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045251" comment="freetype2-64bit less than 2.2.1.20061027-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045252" comment="freetype2-devel-32bit less than 2.2.1.20061027-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045253" comment="freetype2-devel-64bit less than 2.2.1.20061027-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045254" comment="freetype2-devel less than 2.2.1.20061027-15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045255" comment="freetype2 less than 2.2.1.20061027-15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2756</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756" source="CVE"/>
	<description>
	The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 172a2f24d734d56059254d4fed3572f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
		</criteria>
	</criteria>
	<!-- 21b6cae38fee22cacd980332e5cb2324 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045258" comment="gd-devel less than 2.0.32-51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045259" comment="gd less than 2.0.32-51"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2788</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788" source="CVE"/>
	<description>
	Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3449d7057b85fbd5f4719baedcc1b788 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043437" comment="java-1_5_0-sun-alsa less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043438" comment="java-1_5_0-sun-demo less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043439" comment="java-1_5_0-sun-devel less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043440" comment="java-1_5_0-sun-jdbc less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043441" comment="java-1_5_0-sun-plugin less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043442" comment="java-1_5_0-sun-src less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043443" comment="java-1_5_0-sun less than 1.5.0_update12-3.1"/>
		</criteria>
	</criteria>
	<!-- 9fc2c5a4de44f225a0a6359cd98eb972 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043477" comment="java-1_4_2-sun-alsa less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043478" comment="java-1_4_2-sun-demo less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043479" comment="java-1_4_2-sun-devel less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043480" comment="java-1_4_2-sun-jdbc less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043481" comment="java-1_4_2-sun-plugin less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043482" comment="java-1_4_2-sun-src less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043483" comment="java-1_4_2-sun less than 1.4.2_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2789</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789" source="CVE"/>
	<description>
	The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3449d7057b85fbd5f4719baedcc1b788 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043437" comment="java-1_5_0-sun-alsa less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043438" comment="java-1_5_0-sun-demo less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043439" comment="java-1_5_0-sun-devel less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043440" comment="java-1_5_0-sun-jdbc less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043441" comment="java-1_5_0-sun-plugin less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043442" comment="java-1_5_0-sun-src less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043443" comment="java-1_5_0-sun less than 1.5.0_update12-3.1"/>
		</criteria>
	</criteria>
	<!-- 9fc2c5a4de44f225a0a6359cd98eb972 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043477" comment="java-1_4_2-sun-alsa less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043478" comment="java-1_4_2-sun-demo less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043479" comment="java-1_4_2-sun-devel less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043480" comment="java-1_4_2-sun-jdbc less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043481" comment="java-1_4_2-sun-plugin less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043482" comment="java-1_4_2-sun-src less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043483" comment="java-1_4_2-sun less than 1.4.2_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2798</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798" source="CVE"/>
	<description>
	Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
	</description>
 </metadata>
<!-- 3fe33245262093053cbf71d16ed83064 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044764" comment="krb5-32bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044765" comment="krb5-64bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044766" comment="krb5-devel-32bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044767" comment="krb5-devel-64bit less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044768" comment="krb5-devel less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044769" comment="krb5-server less than 1.5.1-23.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044770" comment="krb5 less than 1.5.1-23.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2799</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799" source="CVE"/>
	<description>
	Integer overflow in the "file" program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement.  NOTE: this issue is due to an incorrect patch for CVE-2007-1536.
	</description>
 </metadata>
<!-- 880d54510ca1d8e1850fef0bd9a1262d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045290" comment="file-32bit less than 4.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045291" comment="file-64bit less than 4.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045292" comment="file-devel less than 4.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045293" comment="file less than 4.17-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2833</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2833" source="CVE"/>
	<description>
	Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.
	</description>
 </metadata>
<!-- 7975500151cd062aaf1ca9b59a5c7299 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045309" comment="emacs-el less than 21.3-251"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045310" comment="emacs-info less than 21.3-251"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045311" comment="emacs-nox less than 21.3-251"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045312" comment="emacs-x11 less than 21.3-251"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045313" comment="emacs less than 21.3-251"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2834</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834" source="CVE"/>
	<description>
	Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 289b3b84c1ea3e2534aa037db19bf9ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045381" comment="OpenOffice_org-af less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045382" comment="OpenOffice_org-ar less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045383" comment="OpenOffice_org-be-BY less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045384" comment="OpenOffice_org-bg less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045385" comment="OpenOffice_org-ca less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045386" comment="OpenOffice_org-cs less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045387" comment="OpenOffice_org-cy less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045388" comment="OpenOffice_org-da less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045389" comment="OpenOffice_org-de less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045390" comment="OpenOffice_org-el less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045391" comment="OpenOffice_org-en-GB less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045392" comment="OpenOffice_org-es less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045393" comment="OpenOffice_org-et less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045394" comment="OpenOffice_org-fi less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045395" comment="OpenOffice_org-fr less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045396" comment="OpenOffice_org-galleries less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045397" comment="OpenOffice_org-gnome less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045398" comment="OpenOffice_org-gu-IN less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045399" comment="OpenOffice_org-hi-IN less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045400" comment="OpenOffice_org-hr less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045401" comment="OpenOffice_org-hu less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045402" comment="OpenOffice_org-it less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045403" comment="OpenOffice_org-ja less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045404" comment="OpenOffice_org-kde less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045405" comment="OpenOffice_org-km less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045406" comment="OpenOffice_org-ko less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045407" comment="OpenOffice_org-lt less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045408" comment="OpenOffice_org-mk less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045409" comment="OpenOffice_org-mono less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045410" comment="OpenOffice_org-nb less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045411" comment="OpenOffice_org-nl less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045412" comment="OpenOffice_org-nn less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045413" comment="OpenOffice_org-officebean less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045414" comment="OpenOffice_org-pa-IN less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045415" comment="OpenOffice_org-pl less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045416" comment="OpenOffice_org-pt-BR less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045417" comment="OpenOffice_org-pt less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045418" comment="OpenOffice_org-ru less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045419" comment="OpenOffice_org-rw less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045420" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045421" comment="OpenOffice_org-sdk less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045422" comment="OpenOffice_org-sk less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045423" comment="OpenOffice_org-sl less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045424" comment="OpenOffice_org-sr-CS less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045425" comment="OpenOffice_org-st less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045426" comment="OpenOffice_org-sv less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045427" comment="OpenOffice_org-tr less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045428" comment="OpenOffice_org-ts less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045429" comment="OpenOffice_org-vi less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045430" comment="OpenOffice_org-xh less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045431" comment="OpenOffice_org-zh-CN less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045432" comment="OpenOffice_org-zh-TW less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045433" comment="OpenOffice_org-zu less than 2.0.4-38.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045434" comment="OpenOffice_org less than 2.0.4-38.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2865</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2865" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in sqledit.php in phpPgAdmin 4.1.1 allows remote attackers to inject arbitrary web script or HTML via the server parameter.
	</description>
 </metadata>
<!-- 9e1a9ecb5f09a0a7e3fcd01934df3130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045475" comment="phpPgAdmin less than 4.0.1-61.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2867</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867" source="CVE"/>
	<description>
	Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2868</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868" source="CVE"/>
	<description>
	Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2869</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869" source="CVE"/>
	<description>
	The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2870</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2871</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane.  NOTE: this issue can be leveraged for phishing and other attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0979c6fb0b91843c515facb27dd08f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044477" comment="MozillaThunderbird-translations less than 1.5.0.12-3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044478" comment="MozillaThunderbird less than 1.5.0.12-3.2"/>
		</criteria>
	</criteria>
	<!-- d743b432a58cd44cb73f5b2724025323 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044490" comment="seamonkey-dom-inspector less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044491" comment="seamonkey-irc less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044492" comment="seamonkey-mail less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044493" comment="seamonkey-spellchecker less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044494" comment="seamonkey-venkman less than 1.1.2-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044495" comment="seamonkey less than 1.1.2-1.1"/>
		</criteria>
	</criteria>
	<!-- eba26f81f1344e8a61771b6213c4a69d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044498" comment="MozillaFirefox-translations less than 2.0.0.4-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044499" comment="MozillaFirefox less than 2.0.0.4-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2872</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872" source="CVE"/>
	<description>
	Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 172a2f24d734d56059254d4fed3572f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
		</criteria>
	</criteria>
	<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2876</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2876" source="CVE"/>
	<description>
	The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
	</description>
 </metadata>
<!-- e5b42201d2aa7891a7e6206c8ab4494a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042957" comment="kernel-bigsmp less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042958" comment="kernel-default less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042959" comment="kernel-iseries64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042960" comment="kernel-ppc64 less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042961" comment="kernel-source less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042962" comment="kernel-syms less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042963" comment="kernel-xen less than 2.6.18.8-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042964" comment="kernel-xenpae less than 2.6.18.8-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2926</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926" source="CVE"/>
	<description>
	ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
	</description>
 </metadata>
<!-- 57aee4814cd89b483f1687b8c2efc6fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045533" comment="bind-libs-32bit less than 9.3.2-56.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045534" comment="bind-libs-64bit less than 9.3.2-56.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045535" comment="bind-libs less than 9.3.2-56.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045536" comment="bind-utils less than 9.3.2-56.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045537" comment="bind less than 9.3.2-56.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2949</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949" source="CVE"/>
	<description>
	Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
	</description>
 </metadata>
<!-- 0b42f2c78e996a441f927d0bdae49323 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045562" comment="gimp-devel less than 2.2.13-34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045563" comment="gimp-unstable-devel less than 2.3.11-51.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045564" comment="gimp-unstable less than 2.3.11-51.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045565" comment="gimp less than 2.2.13-34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2951</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2951" source="CVE"/>
	<description>
	The parseIrcUrl function in src/kvirc/kernel/kvi_ircurl.cpp in KVIrc 3.2.0 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in an (1) irc:// or (2) irc6:// URI.
	</description>
 </metadata>
<!-- e006a27fbcc22a31ed81f1b17eb41def -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045571" comment="kvirc less than 3.2.5-26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2953</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953" source="CVE"/>
	<description>
	Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
	</description>
 </metadata>
<!-- 69b4961415fa5b15365d13abd1ec2f8e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045574" comment="gvim less than 7.0-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045575" comment="vim-enhanced less than 7.0-38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2956</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2956" source="CVE"/>
	<description>
	Stack-based buffer overflow in the readRadianceHeader function in (1) src/fileformat/rgbeio.cpp in pfstools 1.6.2 and (2) src/Fileformat/rgbeio.cpp in Qtpfsgui 1.8.11 allows remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file.
	</description>
 </metadata>
<!-- 7fcc3feefdac4755a8964fb6a8079eeb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045577" comment="pfstools less than 1.5-47.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2958</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-2958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958" source="CVE"/>
	<description>
	Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.
	</description>
 </metadata>
<!-- f6ab5eff60ee21d91b98c1d92b75e624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045580" comment="sylpheed-claws less than 2.5.5-29"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3004</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2788.  Reason: This candidate is a duplicate of CVE-2007-2788.  Notes: All CVE users should reference CVE-2007-2788 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3449d7057b85fbd5f4719baedcc1b788 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043437" comment="java-1_5_0-sun-alsa less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043438" comment="java-1_5_0-sun-demo less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043439" comment="java-1_5_0-sun-devel less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043440" comment="java-1_5_0-sun-jdbc less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043441" comment="java-1_5_0-sun-plugin less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043442" comment="java-1_5_0-sun-src less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043443" comment="java-1_5_0-sun less than 1.5.0_update12-3.1"/>
		</criteria>
	</criteria>
	<!-- 9fc2c5a4de44f225a0a6359cd98eb972 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043477" comment="java-1_4_2-sun-alsa less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043478" comment="java-1_4_2-sun-demo less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043479" comment="java-1_4_2-sun-devel less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043480" comment="java-1_4_2-sun-jdbc less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043481" comment="java-1_4_2-sun-plugin less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043482" comment="java-1_4_2-sun-src less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043483" comment="java-1_4_2-sun less than 1.4.2_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3005</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2789.  Reason: This candidate is a duplicate of CVE-2007-2789.  Notes: All CVE users should reference CVE-2007-2789 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3449d7057b85fbd5f4719baedcc1b788 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043437" comment="java-1_5_0-sun-alsa less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043438" comment="java-1_5_0-sun-demo less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043439" comment="java-1_5_0-sun-devel less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043440" comment="java-1_5_0-sun-jdbc less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043441" comment="java-1_5_0-sun-plugin less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043442" comment="java-1_5_0-sun-src less than 1.5.0_update12-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043443" comment="java-1_5_0-sun less than 1.5.0_update12-3.1"/>
		</criteria>
	</criteria>
	<!-- 9fc2c5a4de44f225a0a6359cd98eb972 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009043477" comment="java-1_4_2-sun-alsa less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043478" comment="java-1_4_2-sun-demo less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043479" comment="java-1_4_2-sun-devel less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043480" comment="java-1_4_2-sun-jdbc less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043481" comment="java-1_4_2-sun-plugin less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043482" comment="java-1_4_2-sun-src less than 1.4.2_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009043483" comment="java-1_4_2-sun less than 1.4.2_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3007</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007" source="CVE"/>
	<description>
	PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string.  NOTE: this issue might also involve the realpath function.
	</description>
 </metadata>
<!-- 172a2f24d734d56059254d4fed3572f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043902" comment="apache2-mod_php5 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043903" comment="php5-bcmath less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043904" comment="php5-bz2 less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043905" comment="php5-calendar less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043906" comment="php5-ctype less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043907" comment="php5-curl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043908" comment="php5-dba less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043909" comment="php5-dbase less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043910" comment="php5-devel less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043911" comment="php5-dom less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043912" comment="php5-exif less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043913" comment="php5-fastcgi less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043914" comment="php5-ftp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043915" comment="php5-gd less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043916" comment="php5-gettext less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043917" comment="php5-gmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043918" comment="php5-iconv less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043919" comment="php5-imap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043920" comment="php5-ldap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043921" comment="php5-mbstring less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043922" comment="php5-mcrypt less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043923" comment="php5-mhash less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043924" comment="php5-mysql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043925" comment="php5-ncurses less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043926" comment="php5-odbc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043927" comment="php5-openssl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043928" comment="php5-pcntl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043929" comment="php5-pdo less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043930" comment="php5-pear less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043931" comment="php5-pgsql less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043932" comment="php5-posix less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043933" comment="php5-pspell less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043934" comment="php5-shmop less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043935" comment="php5-snmp less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043936" comment="php5-soap less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043937" comment="php5-sockets less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043938" comment="php5-sqlite less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043939" comment="php5-sysvmsg less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043940" comment="php5-sysvsem less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043941" comment="php5-sysvshm less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043942" comment="php5-tidy less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043943" comment="php5-tokenizer less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043944" comment="php5-wddx less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043945" comment="php5-xmlreader less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043946" comment="php5-xmlrpc less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043947" comment="php5-xsl less than 5.2.0-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043948" comment="php5-zlib less than 5.2.0-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3023</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023" source="CVE"/>
	<description>
	unsp.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 does not properly calculate the end of a certain buffer, with unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 938fd48ea2875f7556f782b968d1ca3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044974" comment="clamav-db less than 0.90.3-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3024</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024" source="CVE"/>
	<description>
	libclamav/others.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 uses insecure permissions for temporary files that are created by the cli_gentempstream function in clamd/clamdscan, which might allow local users to read sensitive files.
	</description>
 </metadata>
<!-- 938fd48ea2875f7556f782b968d1ca3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044974" comment="clamav-db less than 0.90.3-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3025</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3025" source="CVE"/>
	<description>
	Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions.
	</description>
 </metadata>
<!-- 938fd48ea2875f7556f782b968d1ca3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044974" comment="clamav-db less than 0.90.3-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3089</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3099</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3099" source="CVE"/>
	<description>
	usr/mgmt_ipc.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 checks the client's UID on the listening AF_LOCAL socket instead of the new connection, which allows remote attackers to access the management interface and cause a denial of service (iscsid exit or iSCSI connection loss).
	</description>
 </metadata>
<!-- 15e153fb1b7cc8e4c1cdcb8a110fa5ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045621" comment="open-iscsi less than 2.0.713-13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3100</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3100" source="CVE"/>
	<description>
	usr/log.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 uses a semaphore with insecure permissions (world-writable/world-readable) for managing log messages using shared memory, which allows local users to cause a denial of service (hang) by grabbing the semaphore.
	</description>
 </metadata>
<!-- 15e153fb1b7cc8e4c1cdcb8a110fa5ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045621" comment="open-iscsi less than 2.0.713-13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3105</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3105" source="CVE"/>
	<description>
	Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering".  NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
	</description>
 </metadata>
<!-- 1fd4a28a21f2346d8061b360d0d66a3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044918" comment="kernel-bigsmp less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044919" comment="kernel-default less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044920" comment="kernel-iseries64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044921" comment="kernel-kdump less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044922" comment="kernel-ppc64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044923" comment="kernel-source less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044924" comment="kernel-syms less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044925" comment="kernel-xen less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044926" comment="kernel-xenpae less than 2.6.18.8-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3106</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106" source="CVE"/>
	<description>
	lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
	</description>
 </metadata>
<!-- f900529547397ce136cc533f191ed4b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045646" comment="libvorbis-32bit less than 1.1.2-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045647" comment="libvorbis-64bit less than 1.1.2-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045648" comment="libvorbis-devel less than 1.1.2-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045649" comment="libvorbis less than 1.1.2-33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3122</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122" source="CVE"/>
	<description>
	The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.
	</description>
 </metadata>
<!-- 938fd48ea2875f7556f782b968d1ca3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044974" comment="clamav-db less than 0.90.3-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3123</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123" source="CVE"/>
	<description>
	unrar.c in libclamav in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to cause a denial of service (core dump) via a crafted RAR file with a modified vm_codesize value, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 938fd48ea2875f7556f782b968d1ca3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044974" comment="clamav-db less than 0.90.3-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3227</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.
	</description>
 </metadata>
<!-- 6aa6b1173a60a81cd0b6c7e809cc68c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045651" comment="rubygem-activesupport less than 1.3.1-29"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3257</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257" source="CVE"/>
	<description>
	Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
	</description>
 </metadata>
<!-- 140978f7493f5235e91ec0a6f1b725c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045661" comment="evolution-data-server-32bit less than 1.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045662" comment="evolution-data-server-64bit less than 1.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045663" comment="evolution-data-server-devel less than 1.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045664" comment="evolution-data-server less than 1.8.2-11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3285</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3285" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3304</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304" source="CVE"/>
	<description>
	Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042441" comment="apache2-devel less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042442" comment="apache2-doc less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042443" comment="apache2-example-pages less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042444" comment="apache2-prefork less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042445" comment="apache2-worker less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042446" comment="apache2 less than 2.2.3-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3372</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3372" source="CVE"/>
	<description>
	The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
	</description>
 </metadata>
<!-- d16873793af54426be3949bbb07df927 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045676" comment="avahi-compat-howl-devel less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045677" comment="avahi-compat-howl less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045678" comment="avahi-compat-mDNSResponder-devel less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045679" comment="avahi-compat-mDNSResponder less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045680" comment="avahi-devel less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045681" comment="avahi-glib less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045682" comment="avahi-mono less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045683" comment="avahi-qt3 less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045684" comment="avahi-qt4 less than 0.6.14-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045685" comment="avahi less than 0.6.14-38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3377</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377" source="CVE"/>
	<description>
	Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
	</description>
 </metadata>
<!-- 0d6dc68593924646fcf06319b848f065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045688" comment="perl-Net-DNS less than 0.59-18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3382</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3385</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3387</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387" source="CVE"/>
	<description>
	Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 18a1e113e898cdbc515dc1a9510e8d68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045703" comment="kdegraphics3-pdf less than 3.5.5-43.3"/>
	</criteria>
	<!-- 24f2f4f3ac613c484ed1812527ee9f70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045708" comment="poppler-devel less than 0.5.4-33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045709" comment="poppler less than 0.5.4-33.3"/>
		</criteria>
	</criteria>
	<!-- e8f06f9c7ce1a19524db76d85812a4ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045721" comment="xpdf-tools less than 3.01-58.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045722" comment="xpdf less than 3.01-58.3"/>
		</criteria>
	</criteria>
	<!-- f20849760a13fc45bdaaefe844448b30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045729" comment="cups-client less than 1.2.7-12.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045730" comment="cups-devel less than 1.2.7-12.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045731" comment="cups-libs-32bit less than 1.2.7-12.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045732" comment="cups-libs-64bit less than 1.2.7-12.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045733" comment="cups-libs less than 1.2.7-12.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045734" comment="cups less than 1.2.7-12.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3388</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.
	</description>
 </metadata>
<!-- 58eabb5688b3b97f73b473c7f90f594f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045749" comment="qt3-32bit less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045750" comment="qt3-64bit less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045751" comment="qt3-devel-32bit less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045752" comment="qt3-devel-64bit less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045753" comment="qt3-devel less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045754" comment="qt3-static less than 3.3.7-17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045755" comment="qt3 less than 3.3.7-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3389</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389" source="CVE"/>
	<description>
	Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
	</description>
 </metadata>
<!-- 9db4f43ce457aaf815baa9653bb59672 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045767" comment="wireshark-devel less than 0.99.5-5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045768" comment="wireshark less than 0.99.5-5.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3390</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390" source="CVE"/>
	<description>
	Wireshark 0.99.5 and 0.10.x up to 0.10.14, when running on certain systems, allows remote attackers to cause a denial of service (crash) via crafted iSeries capture files that trigger a SIGTRAP.
	</description>
 </metadata>
<!-- 9db4f43ce457aaf815baa9653bb59672 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045767" comment="wireshark-devel less than 0.99.5-5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045768" comment="wireshark less than 0.99.5-5.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3391</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391" source="CVE"/>
	<description>
	Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop.
	</description>
 </metadata>
<!-- 9db4f43ce457aaf815baa9653bb59672 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045767" comment="wireshark-devel less than 0.99.5-5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045768" comment="wireshark less than 0.99.5-5.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3392</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392" source="CVE"/>
	<description>
	Wireshark before 0.99.6 allows remote attackers to cause a denial of service via malformed (1) SSL or (2) MMS packets that trigger an infinite loop.
	</description>
 </metadata>
<!-- 9db4f43ce457aaf815baa9653bb59672 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045767" comment="wireshark-devel less than 0.99.5-5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045768" comment="wireshark less than 0.99.5-5.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3393</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393" source="CVE"/>
	<description>
	Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.
	</description>
 </metadata>
<!-- 9db4f43ce457aaf815baa9653bb59672 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045767" comment="wireshark-devel less than 0.99.5-5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045768" comment="wireshark less than 0.99.5-5.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3409</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409" source="CVE"/>
	<description>
	Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
	</description>
 </metadata>
<!-- 0d6dc68593924646fcf06319b848f065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045688" comment="perl-Net-DNS less than 0.59-18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3410</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410" source="CVE"/>
	<description>
	Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value.
	</description>
 </metadata>
<!-- 5c179399e8cb2e749d746adfd954246f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045774" comment="RealPlayer less than 10.0.5-34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045771" comment="RealPlayer less than 10.0.9-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3456</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player 9.0.45.0 and earlier might allow remote attackers to execute arbitrary code via a large length value for a (1) Long string or (2) XML variable type in a crafted (a) FLV or (b) SWF file, related to an "input validation error," including a signed comparison of values that are assumed to be non-negative.
	</description>
 </metadata>
<!-- 993344f570fb77d8d32ac70543dbf620 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044678" comment="flash-player less than 9.0.48.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3457</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457" source="CVE"/>
	<description>
	Adobe Flash Player 8.0.34.0 and earlier insufficiently validates HTTP Referer headers, which might allow remote attackers to conduct a CSRF attack via a crafted SWF file.
	</description>
 </metadata>
<!-- 993344f570fb77d8d32ac70543dbf620 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044678" comment="flash-player less than 9.0.48.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3472</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472" source="CVE"/>
	<description>
	Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 47596944d1a2be9ffae2c26370bfdbc1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045781" comment="gd-devel less than 2.0.32-53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045782" comment="gd less than 2.0.32-53"/>
		</criteria>
	</criteria>
	<!-- badf637480fa27397801dc70a7e80ee1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3475</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475" source="CVE"/>
	<description>
	The GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via a GIF image that has no global color map.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 47596944d1a2be9ffae2c26370bfdbc1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045781" comment="gd-devel less than 2.0.32-53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045782" comment="gd less than 2.0.32-53"/>
		</criteria>
	</criteria>
	<!-- badf637480fa27397801dc70a7e80ee1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3476</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476" source="CVE"/>
	<description>
	Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 47596944d1a2be9ffae2c26370bfdbc1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045781" comment="gd-devel less than 2.0.32-53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045782" comment="gd less than 2.0.32-53"/>
		</criteria>
	</criteria>
	<!-- badf637480fa27397801dc70a7e80ee1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3477</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477" source="CVE"/>
	<description>
	The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 47596944d1a2be9ffae2c26370bfdbc1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045781" comment="gd-devel less than 2.0.32-53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045782" comment="gd less than 2.0.32-53"/>
		</criteria>
	</criteria>
	<!-- badf637480fa27397801dc70a7e80ee1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3478</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478" source="CVE"/>
	<description>
	Race condition in gdImageStringFTEx (gdft_draw_bitmap) in gdft.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors, possibly involving truetype font (TTF) support.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 47596944d1a2be9ffae2c26370bfdbc1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045781" comment="gd-devel less than 2.0.32-53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045782" comment="gd less than 2.0.32-53"/>
		</criteria>
	</criteria>
	<!-- badf637480fa27397801dc70a7e80ee1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3511</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3511" source="CVE"/>
	<description>
	The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3641</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641" source="CVE"/>
	<description>
	archive_read_support_format_tar.c in libarchive before 2.2.4 does not properly compute the length of a certain buffer when processing a malformed pax extension header, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PAX or (2) TAR archive that triggers a buffer overflow.
	</description>
 </metadata>
<!-- 6cec58f9397cd63b6615ea174acfb73e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045784" comment="bsdtar less than 1.3.1-37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045785" comment="libarchive-devel less than 1.3.1-37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045786" comment="libarchive less than 1.3.1-37.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3644</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644" source="CVE"/>
	<description>
	archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (infinite loop) via (1) an end-of-file condition within a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive.
	</description>
 </metadata>
<!-- 6cec58f9397cd63b6615ea174acfb73e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045784" comment="bsdtar less than 1.3.1-37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045785" comment="libarchive-devel less than 1.3.1-37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045786" comment="libarchive less than 1.3.1-37.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3645</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645" source="CVE"/>
	<description>
	archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (crash) via (1) an end-of-file condition within a tar header that follows a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive, which results in a NULL pointer dereference, a different issue than CVE-2007-3644.
	</description>
 </metadata>
<!-- 6cec58f9397cd63b6615ea174acfb73e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045784" comment="bsdtar less than 1.3.1-37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045785" comment="libarchive-devel less than 1.3.1-37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045786" comment="libarchive less than 1.3.1-37.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3656</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656" source="CVE"/>
	<description>
	Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3670</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3670" source="CVE"/>
	<description>
	Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.  NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3725</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3725" source="CVE"/>
	<description>
	The RAR VM (unrarvm.c) in Clam Antivirus (ClamAV) before 0.91 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive, resulting in a NULL pointer dereference.
	</description>
 </metadata>
<!-- a33879bfc64ba9224f811adbcd17314d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045804" comment="clamav-db less than 0.91.1-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033599" comment="clamav less than 0.91.1-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3734</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3735</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3736</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3737</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5 allows remote attackers to execute arbitrary code with chrome privileges by calling an event handler from an unspecified "element outside of a document."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3738</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e2519b5b41ee1e9b76d72eeb8b9434 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045581" comment="MozillaFirefox-translations less than 2.0.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045582" comment="MozillaFirefox less than 2.0.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- c90aa29eaf0bd38202bb6774dd4808d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045596" comment="seamonkey-dom-inspector less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045597" comment="seamonkey-irc less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045598" comment="seamonkey-mail less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045599" comment="seamonkey-spellchecker less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045600" comment="seamonkey-venkman less than 1.1.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045601" comment="seamonkey less than 1.1.3-0.1"/>
		</criteria>
	</criteria>
	<!-- cf8ab7a7e56f02a944d1bcbf73c08824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045603" comment="MozillaThunderbird-translations less than 1.5.0.12-3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045604" comment="MozillaThunderbird less than 1.5.0.12-3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3740</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3740" source="CVE"/>
	<description>
	The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3762</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3762" source="CVE"/>
	<description>
	Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame.
	</description>
 </metadata>
<!-- 1d4ec057e4aee0283f87db2f86e6cebe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045808" comment="asterisk less than 1.2.13-25"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3763</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763" source="CVE"/>
	<description>
	The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
	</description>
 </metadata>
<!-- 1d4ec057e4aee0283f87db2f86e6cebe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045808" comment="asterisk less than 1.2.13-25"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3764</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764" source="CVE"/>
	<description>
	The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy."
	</description>
 </metadata>
<!-- 1d4ec057e4aee0283f87db2f86e6cebe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045808" comment="asterisk less than 1.2.13-25"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3780</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780" source="CVE"/>
	<description>
	MySQL Community Server before 5.0.45 allows remote attackers to cause a denial of service (daemon crash) via a malformed password packet in the connection protocol.
	</description>
 </metadata>
<!-- 2afd851de2949c70ef849c5b09fa6209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045818" comment="mysql-Max less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045819" comment="mysql-bench less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045820" comment="mysql-client less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045821" comment="mysql-debug less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045822" comment="mysql-devel less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045823" comment="mysql-shared-32bit less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045824" comment="mysql-shared-64bit less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045825" comment="mysql-shared less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045826" comment="mysql less than 5.0.26-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3781</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781" source="CVE"/>
	<description>
	MySQL Community Server before 5.0.45 does not require privileges such as SELECT for the source table in a CREATE TABLE LIKE statement, which allows remote authenticated users to obtain sensitive information such as the table structure.
	</description>
 </metadata>
<!-- 2afd851de2949c70ef849c5b09fa6209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045818" comment="mysql-Max less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045819" comment="mysql-bench less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045820" comment="mysql-client less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045821" comment="mysql-debug less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045822" comment="mysql-devel less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045823" comment="mysql-shared-32bit less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045824" comment="mysql-shared-64bit less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045825" comment="mysql-shared less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045826" comment="mysql less than 5.0.26-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3782</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3782" source="CVE"/>
	<description>
	MySQL Community Server before 5.0.45 allows remote authenticated users to gain update privileges for a table in another database via a view that refers to this external table.
	</description>
 </metadata>
<!-- 2afd851de2949c70ef849c5b09fa6209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045818" comment="mysql-Max less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045819" comment="mysql-bench less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045820" comment="mysql-client less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045821" comment="mysql-debug less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045822" comment="mysql-devel less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045823" comment="mysql-shared-32bit less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045824" comment="mysql-shared-64bit less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045825" comment="mysql-shared less than 5.0.26-14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045826" comment="mysql less than 5.0.26-14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3798</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798" source="CVE"/>
	<description>
	Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
	</description>
 </metadata>
<!-- d24856741b7737d60a5cb1ab74ee2207 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045829" comment="tcpdump less than 3.9.4-36"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3799</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3799" source="CVE"/>
	<description>
	The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
	</description>
 </metadata>
<!-- badf637480fa27397801dc70a7e80ee1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045113" comment="apache2-mod_php5 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045114" comment="php5-bcmath less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045115" comment="php5-bz2 less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045116" comment="php5-calendar less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045117" comment="php5-ctype less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045118" comment="php5-curl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045119" comment="php5-dba less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045120" comment="php5-dbase less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045121" comment="php5-devel less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045122" comment="php5-dom less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045123" comment="php5-exif less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045124" comment="php5-fastcgi less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045125" comment="php5-ftp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045126" comment="php5-gd less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045127" comment="php5-gettext less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045128" comment="php5-gmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045129" comment="php5-hash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045130" comment="php5-iconv less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045131" comment="php5-imap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045132" comment="php5-json less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045133" comment="php5-ldap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045134" comment="php5-mbstring less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045135" comment="php5-mcrypt less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045136" comment="php5-mhash less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045137" comment="php5-mysql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045138" comment="php5-ncurses less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045139" comment="php5-odbc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045140" comment="php5-openssl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045141" comment="php5-pcntl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045142" comment="php5-pdo less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045143" comment="php5-pear less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045144" comment="php5-pgsql less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045145" comment="php5-posix less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045146" comment="php5-pspell less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045147" comment="php5-shmop less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045148" comment="php5-snmp less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045149" comment="php5-soap less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045150" comment="php5-sockets less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045151" comment="php5-sqlite less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045152" comment="php5-suhosin less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045153" comment="php5-sysvmsg less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045154" comment="php5-sysvsem less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045155" comment="php5-sysvshm less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045156" comment="php5-tidy less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045157" comment="php5-tokenizer less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045158" comment="php5-wddx less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045159" comment="php5-xmlreader less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045160" comment="php5-xmlrpc less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045161" comment="php5-xmlwriter less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045162" comment="php5-xsl less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045163" comment="php5-zip less than 5.2.0-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045164" comment="php5-zlib less than 5.2.0-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3819</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3819" source="CVE"/>
	<description>
	Opera 9.21 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
	</description>
 </metadata>
<!-- 2ba3df2e77dbc1bf2dd474f79803595a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045830" comment="opera less than 9.22-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3843</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3843" source="CVE"/>
	<description>
	The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3844</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3845</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3845" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041.  NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3847</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847" source="CVE"/>
	<description>
	The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042441" comment="apache2-devel less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042442" comment="apache2-doc less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042443" comment="apache2-example-pages less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042444" comment="apache2-prefork less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042445" comment="apache2-worker less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042446" comment="apache2 less than 2.2.3-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3848</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848" source="CVE"/>
	<description>
	Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3851</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3851" source="CVE"/>
	<description>
	The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
	</description>
 </metadata>
<!-- 1fd4a28a21f2346d8061b360d0d66a3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044918" comment="kernel-bigsmp less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044919" comment="kernel-default less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044920" comment="kernel-iseries64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044921" comment="kernel-kdump less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044922" comment="kernel-ppc64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044923" comment="kernel-source less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044924" comment="kernel-syms less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044925" comment="kernel-xen less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044926" comment="kernel-xenpae less than 2.6.18.8-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3920</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3920" source="CVE"/>
	<description>
	GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
	</description>
 </metadata>
<!-- 168a4e311a76021ddb0b65273348544a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045873" comment="xorg-x11-server-sdk less than 7.2-30.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045874" comment="xorg-x11-server less than 7.2-30.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3929</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3929" source="CVE"/>
	<description>
	Use-after-free vulnerability in the BitTorrent support in Opera before 9.22 allows user-assisted remote attackers to execute arbitrary code via a crafted header in a torrent file, which leaves a dangling pointer to an invalid object.
	</description>
 </metadata>
<!-- 2ba3df2e77dbc1bf2dd474f79803595a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045830" comment="opera less than 9.22-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3946</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3946" source="CVE"/>
	<description>
	mod_auth (http_auth.c) in lighttpd before 1.4.16 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving (1) a memory leak, (2) use of md5-sess without a cnonce, (3) base64 encoded strings, and (4) trailing whitespace in the Auth-Digest header.
	</description>
 </metadata>
<!-- 2a299378eb8ec66a877421cb2e03dd67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045876" comment="lighttpd less than 1.4.13-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3947</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3947" source="CVE"/>
	<description>
	request.c in lighttpd 1.4.15 allows remote attackers to cause a denial of service (daemon crash) by sending an HTTP request with duplicate headers, as demonstrated by a request containing two Location header lines, which results in a segmentation fault.
	</description>
 </metadata>
<!-- 2a299378eb8ec66a877421cb2e03dd67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045876" comment="lighttpd less than 1.4.13-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3948</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3948" source="CVE"/>
	<description>
	connections.c in lighttpd before 1.4.16 might accept more connections than the configured maximum, which allows remote attackers to cause a denial of service (failed assertion) via a large number of connection attempts.
	</description>
 </metadata>
<!-- 2a299378eb8ec66a877421cb2e03dd67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045876" comment="lighttpd less than 1.4.13-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3949</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3949" source="CVE"/>
	<description>
	mod_access.c in lighttpd 1.4.15 ignores trailing / (slash) characters in the URL, which allows remote attackers to bypass url.access-deny settings.
	</description>
 </metadata>
<!-- 2a299378eb8ec66a877421cb2e03dd67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045876" comment="lighttpd less than 1.4.13-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3950</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3950" source="CVE"/>
	<description>
	lighttpd 1.4.15, when run on 32 bit platforms, allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving the use of incompatible format specifiers in certain debugging messages in the (1) mod_scgi, (2) mod_fastcgi, and (3) mod_webdav modules.
	</description>
 </metadata>
<!-- 2a299378eb8ec66a877421cb2e03dd67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045876" comment="lighttpd less than 1.4.13-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3996</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996" source="CVE"/>
	<description>
	Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3998</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998" source="CVE"/>
	<description>
	The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3999</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-3999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999" source="CVE"/>
	<description>
	Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d6825ac865c0da993cb65723e7379ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045897" comment="krb5-32bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045898" comment="krb5-64bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045899" comment="krb5-apps-clients less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045900" comment="krb5-apps-servers less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045901" comment="krb5-client less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045902" comment="krb5-devel-32bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045903" comment="krb5-devel-64bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045904" comment="krb5-devel less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045905" comment="krb5-server less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045906" comment="krb5 less than 1.5.1-23.10"/>
		</criteria>
	</criteria>
	<!-- 48ed40772e9b05638a27723fc485215f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045909" comment="librpcsecgss less than 0.14-23"/>
	</criteria>
	<!-- b45927630035cdba35f82fb6d42e619a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045932" comment="krb5-32bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045933" comment="krb5-64bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045934" comment="krb5-apps-clients less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045935" comment="krb5-apps-servers less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045936" comment="krb5-client less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045937" comment="krb5-devel-32bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045938" comment="krb5-devel-64bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045939" comment="krb5-devel less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045940" comment="krb5-server less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045941" comment="krb5 less than 1.5.1-23.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4000</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000" source="CVE"/>
	<description>
	The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d6825ac865c0da993cb65723e7379ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045897" comment="krb5-32bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045898" comment="krb5-64bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045899" comment="krb5-apps-clients less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045900" comment="krb5-apps-servers less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045901" comment="krb5-client less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045902" comment="krb5-devel-32bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045903" comment="krb5-devel-64bit less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045904" comment="krb5-devel less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045905" comment="krb5-server less than 1.5.1-23.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045906" comment="krb5 less than 1.5.1-23.10"/>
		</criteria>
	</criteria>
	<!-- b45927630035cdba35f82fb6d42e619a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045932" comment="krb5-32bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045933" comment="krb5-64bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045934" comment="krb5-apps-clients less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045935" comment="krb5-apps-servers less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045936" comment="krb5-client less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045937" comment="krb5-devel-32bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045938" comment="krb5-devel-64bit less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045939" comment="krb5-devel less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045940" comment="krb5-server less than 1.5.1-23.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045941" comment="krb5 less than 1.5.1-23.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4029</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029" source="CVE"/>
	<description>
	libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
	</description>
 </metadata>
<!-- 39e4f0e9bf0fbced20cd8833cf344e19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045950" comment="libvorbis-32bit less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045951" comment="libvorbis-64bit less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045952" comment="libvorbis-devel less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045953" comment="libvorbis less than 1.1.2-35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4033</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033" source="CVE"/>
	<description>
	Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter.  NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
	</description>
 </metadata>
<!-- 618ac918990e51fa8e1bab4dcc176d09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045961" comment="t1lib-devel less than 1.3.1-608"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045962" comment="t1lib less than 1.3.1-608"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4065</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065" source="CVE"/>
	<description>
	lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.
	</description>
 </metadata>
<!-- 39e4f0e9bf0fbced20cd8833cf344e19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045950" comment="libvorbis-32bit less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045951" comment="libvorbis-64bit less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045952" comment="libvorbis-devel less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045953" comment="libvorbis less than 1.1.2-35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4066</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066" source="CVE"/>
	<description>
	Multiple buffer overflows in Xiph.Org libvorbis before 1.2.0 allow context-dependent attackers to cause a denial of service or have other unspecified impact via a crafted OGG file, aka trac Changesets 13162, 13168, 13169, 13170, 13172, 13211, and 13215, as demonstrated by an overflow in oggenc.exe related to the _psy_noiseguards_8 array.
	</description>
 </metadata>
<!-- 39e4f0e9bf0fbced20cd8833cf344e19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045950" comment="libvorbis-32bit less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045951" comment="libvorbis-64bit less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045952" comment="libvorbis-devel less than 1.1.2-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045953" comment="libvorbis less than 1.1.2-35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4074</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4074" source="CVE"/>
	<description>
	The default configuration of Centre for Speech Technology Research (CSTR) Festival 1.95 beta (aka 2.0 beta) on Gentoo Linux, SUSE Linux, and possibly other distributions, is run locally with elevated privileges without requiring authentication, which allows local and remote attackers to execute arbitrary commands via the local daemon on port 1314, a different vulnerability than CVE-2001-0956.  NOTE: this issue is local in some environments, but remote on others.
	</description>
 </metadata>
<!-- 7e907172099b75a3769b16882befb9c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045968" comment="festival-devel less than 1.96-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045969" comment="festival less than 1.96-21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4091</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091" source="CVE"/>
	<description>
	Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.
	</description>
 </metadata>
<!-- 724e31ceca4b0bfb64639b8805dd2e2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045973" comment="rsync less than 2.6.8-29"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4131</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131" source="CVE"/>
	<description>
	Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24ea039a3a38a33d7c444545bead9da1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045976" comment="star less than 1.5a70-35"/>
	</criteria>
	<!-- 57517a86fc2aa11700d9d454585da994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045978" comment="tar less than 1.15.1-42.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4137</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137" source="CVE"/>
	<description>
	Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
	</description>
 </metadata>
<!-- dc22a7a9ecfe32f17e33d32d5c31fbee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045999" comment="qt3-32bit less than 3.3.7-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046000" comment="qt3-64bit less than 3.3.7-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046001" comment="qt3-devel-32bit less than 3.3.7-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046002" comment="qt3-devel-64bit less than 3.3.7-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046003" comment="qt3-devel-doc less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046004" comment="qt3-devel-tools-64bit less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046005" comment="qt3-devel-tools less than 3.3.7-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046006" comment="qt3-devel less than 3.3.7-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046007" comment="qt3-static less than 3.3.7-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046008" comment="qt3 less than 3.3.7-18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4224</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4224" source="CVE"/>
	<description>
	KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
	</description>
 </metadata>
<!-- 4d8277d4e148375d3764390f40d7c2e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046052" comment="fileshareset less than 2.0-242.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046053" comment="kdebase3-32bit less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046054" comment="kdebase3-64bit less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046055" comment="kdebase3-beagle less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046056" comment="kdebase3-devel less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046057" comment="kdebase3-extra less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046058" comment="kdebase3-kdm less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046059" comment="kdebase3-ksysguardd less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046060" comment="kdebase3-nsplugin less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046061" comment="kdebase3-samba less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046062" comment="kdebase3-session less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046063" comment="kdebase3 less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046064" comment="kdelibs3-32bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046065" comment="kdelibs3-64bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046066" comment="kdelibs3-arts-32bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046067" comment="kdelibs3-arts-64bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046068" comment="kdelibs3-arts less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046069" comment="kdelibs3-devel less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046070" comment="kdelibs3-doc less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046071" comment="kdelibs3 less than 3.5.5-45.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4308</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308" source="CVE"/>
	<description>
	The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4324</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324" source="CVE"/>
	<description>
	ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.  NOTE: 9.0.115.0 introduces support for a workaround, but does not fix the vulnerability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
	</criteria>
	<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4351</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351" source="CVE"/>
	<description>
	Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 76d768b235a994cbd4fd6639fe1821cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046084" comment="cups-client less than 1.2.7-12.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046085" comment="cups-devel less than 1.2.7-12.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046086" comment="cups-libs-32bit less than 1.2.7-12.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046087" comment="cups-libs-64bit less than 1.2.7-12.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046088" comment="cups-libs less than 1.2.7-12.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046089" comment="cups less than 1.2.7-12.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4352</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" source="CVE"/>
	<description>
	Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0585acb38f63d10b7913a678a1cc0d24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046092" comment="gpdf less than 2.10.0-82.4"/>
	</criteria>
	<!-- 1a64560332f562764a93e6b6f66bd294 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046105" comment="cups-client less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046106" comment="cups-devel less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046107" comment="cups-libs-32bit less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046108" comment="cups-libs-64bit less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046109" comment="cups-libs less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046110" comment="cups less than 1.2.7-12.7"/>
		</criteria>
	</criteria>
	<!-- a4547a5fac6802e4ca828e1905a35637 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046122" comment="poppler-devel less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046123" comment="poppler-glib less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046124" comment="poppler-qt less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046125" comment="poppler-tools less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046126" comment="poppler less than 0.5.4-33.5"/>
		</criteria>
	</criteria>
	<!-- ae5e13b76ac07f1055f34e55a6925b8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046143" comment="koffice-database-mysql less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046144" comment="koffice-database-psql less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046145" comment="koffice-database less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046146" comment="koffice-devel less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046147" comment="koffice-extra less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046148" comment="koffice-illustration less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046149" comment="koffice-planning less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046150" comment="koffice-presentation less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046151" comment="koffice-python less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046152" comment="koffice-ruby less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046153" comment="koffice-spreadsheet less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046154" comment="koffice-wordprocessing less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046155" comment="koffice less than 1.6.0-0.5"/>
		</criteria>
	</criteria>
	<!-- d063f6fa715e3c80bf0f69f3adb58fb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046164" comment="xpdf-tools less than 3.01-58.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046165" comment="xpdf less than 3.01-58.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4367</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4367" source="CVE"/>
	<description>
	Opera before 9.23 allows remote attackers to execute arbitrary code via crafted Javascript that triggers a "virtual function call on an invalid pointer."
	</description>
 </metadata>
<!-- 558d6eaa10e726668a4cc3e96f3dda2b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046179" comment="opera less than 9.23-3.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4460</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460" source="CVE"/>
	<description>
	The RenderV2ToFile function in tag_file.cpp in id3lib (aka libid3) 3.8.3 allows local users to overwrite arbitrary files via a symlink attack on a temporary file whose name is constructed from the name of a file being tagged.
	</description>
 </metadata>
<!-- b2a8c272a56b75af030dac2110f8cf20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046204" comment="id3lib-devel less than 3.8.3-126"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046205" comment="id3lib-examples less than 3.8.3-126"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046206" comment="id3lib less than 3.8.3-126"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4465</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042441" comment="apache2-devel less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042442" comment="apache2-doc less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042443" comment="apache2-example-pages less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042444" comment="apache2-prefork less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042445" comment="apache2-worker less than 2.2.3-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042446" comment="apache2 less than 2.2.3-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4476</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476" source="CVE"/>
	<description>
	Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 475cbf9402dc73635592adcbfc377669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046209" comment="cpio less than 2.6-42"/>
	</criteria>
	<!-- f6f9332f1afb9d69cc3fbfd8ecfd9c57 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046213" comment="tar less than 1.15.1-42.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4510</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4510" source="CVE"/>
	<description>
	ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f834c3e51966f7a31ea5ddbf7e767879 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046218" comment="clamav-db less than 0.91.2-3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046219" comment="clamav less than 0.91.2-3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4560</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560" source="CVE"/>
	<description>
	clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
	</description>
 </metadata>
<!-- f834c3e51966f7a31ea5ddbf7e767879 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046218" comment="clamav-db less than 0.91.2-3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046219" comment="clamav less than 0.91.2-3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4565</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565" source="CVE"/>
	<description>
	sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
	</description>
 </metadata>
<!-- 5053f63f6c797cb363e23e5dfd5b778d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046224" comment="fetchmail less than 6.3.5-23.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046225" comment="fetchmailconf less than 6.3.5-23.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4568</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568" source="CVE"/>
	<description>
	Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f2479b18f1f422b5b4b2ce76c46b9b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046280" comment="xorg-x11-Xvnc less than 7.1-33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046281" comment="xorg-x11-devel-32bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046282" comment="xorg-x11-devel-64bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046283" comment="xorg-x11-devel less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046284" comment="xorg-x11-doc less than 7.2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046285" comment="xorg-x11-libs-32bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046286" comment="xorg-x11-libs-64bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046287" comment="xorg-x11-libs less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046288" comment="xorg-x11-server-sdk less than 7.2-30.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046289" comment="xorg-x11-server less than 7.2-30.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046290" comment="xorg-x11 less than 7.2-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4569</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569" source="CVE"/>
	<description>
	backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
	</description>
 </metadata>
<!-- 4d8277d4e148375d3764390f40d7c2e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046052" comment="fileshareset less than 2.0-242.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046053" comment="kdebase3-32bit less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046054" comment="kdebase3-64bit less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046055" comment="kdebase3-beagle less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046056" comment="kdebase3-devel less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046057" comment="kdebase3-extra less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046058" comment="kdebase3-kdm less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046059" comment="kdebase3-ksysguardd less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046060" comment="kdebase3-nsplugin less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046061" comment="kdebase3-samba less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046062" comment="kdebase3-session less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046063" comment="kdebase3 less than 3.5.5-102.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046064" comment="kdelibs3-32bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046065" comment="kdelibs3-64bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046066" comment="kdelibs3-arts-32bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046067" comment="kdelibs3-arts-64bit less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046068" comment="kdelibs3-arts less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046069" comment="kdelibs3-devel less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046070" comment="kdelibs3-doc less than 3.5.5-45.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046071" comment="kdelibs3 less than 3.5.5-45.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
	<description>
	The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
	</description>
 </metadata>
<!-- 1fd4a28a21f2346d8061b360d0d66a3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044918" comment="kernel-bigsmp less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044919" comment="kernel-default less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044920" comment="kernel-iseries64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044921" comment="kernel-kdump less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044922" comment="kernel-ppc64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044923" comment="kernel-source less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044924" comment="kernel-syms less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044925" comment="kernel-xen less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044926" comment="kernel-xenpae less than 2.6.18.8-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4572</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572" source="CVE"/>
	<description>
	Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
	</description>
 </metadata>
<!-- 536774cfb51ad1e7572f45d3ced6cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046335" comment="cifs-mount less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046336" comment="ldapsmb less than 1.34b-27.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046337" comment="libmsrpc-devel less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046338" comment="libmsrpc less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046339" comment="libsmbclient-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046340" comment="libsmbclient-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046341" comment="libsmbclient-devel less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046342" comment="libsmbclient less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046343" comment="samba-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046344" comment="samba-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046345" comment="samba-client-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046346" comment="samba-client-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046347" comment="samba-client less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046348" comment="samba-doc less than 3.0.23d-19.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046349" comment="samba-krb-printing less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046350" comment="samba-pdb less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046351" comment="samba-python less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046352" comment="samba-vscan less than 0.3.6b-98.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046353" comment="samba-winbind-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046354" comment="samba-winbind-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046355" comment="samba-winbind less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046356" comment="samba less than 3.0.23d-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4573</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
	</description>
 </metadata>
<!-- 1fd4a28a21f2346d8061b360d0d66a3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044918" comment="kernel-bigsmp less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044919" comment="kernel-default less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044920" comment="kernel-iseries64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044921" comment="kernel-kdump less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044922" comment="kernel-ppc64 less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044923" comment="kernel-source less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044924" comment="kernel-syms less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044925" comment="kernel-xen less than 2.6.18.8-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044926" comment="kernel-xenpae less than 2.6.18.8-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4575</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575" source="CVE"/>
	<description>
	HSQLDB before 1.8.0.9, as used in OpenOffice.org (OOo) 2 before 2.3.1, allows user-assisted remote attackers to execute arbitrary Java code via crafted database documents, related to "exposing static java methods."
	</description>
 </metadata>
<!-- 94a6e933910522479136681cc8457dce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046426" comment="OpenOffice_org-af less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046427" comment="OpenOffice_org-af less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046428" comment="OpenOffice_org-ar less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046429" comment="OpenOffice_org-ar less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046430" comment="OpenOffice_org-be-BY less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046431" comment="OpenOffice_org-be-BY less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046432" comment="OpenOffice_org-bg less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046433" comment="OpenOffice_org-bg less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046434" comment="OpenOffice_org-ca less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046435" comment="OpenOffice_org-ca less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046436" comment="OpenOffice_org-cs less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046437" comment="OpenOffice_org-cs less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046438" comment="OpenOffice_org-cy less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046439" comment="OpenOffice_org-cy less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046440" comment="OpenOffice_org-da less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046441" comment="OpenOffice_org-da less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046442" comment="OpenOffice_org-de less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046443" comment="OpenOffice_org-de less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046444" comment="OpenOffice_org-el less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046445" comment="OpenOffice_org-el less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046446" comment="OpenOffice_org-en-GB less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046447" comment="OpenOffice_org-en-GB less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046448" comment="OpenOffice_org-es less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046449" comment="OpenOffice_org-es less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046450" comment="OpenOffice_org-et less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046451" comment="OpenOffice_org-et less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046452" comment="OpenOffice_org-fi less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046453" comment="OpenOffice_org-fi less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046454" comment="OpenOffice_org-fr less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046455" comment="OpenOffice_org-fr less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046456" comment="OpenOffice_org-galleries less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046457" comment="OpenOffice_org-galleries less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046458" comment="OpenOffice_org-gnome less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046459" comment="OpenOffice_org-gnome less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046460" comment="OpenOffice_org-gu-IN less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046461" comment="OpenOffice_org-gu-IN less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046462" comment="OpenOffice_org-hi-IN less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046463" comment="OpenOffice_org-hi-IN less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046464" comment="OpenOffice_org-hr less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046465" comment="OpenOffice_org-hr less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046466" comment="OpenOffice_org-hu less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046467" comment="OpenOffice_org-hu less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046468" comment="OpenOffice_org-it less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046469" comment="OpenOffice_org-it less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046470" comment="OpenOffice_org-ja less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046471" comment="OpenOffice_org-ja less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046472" comment="OpenOffice_org-kde less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046473" comment="OpenOffice_org-kde less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046474" comment="OpenOffice_org-km less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046475" comment="OpenOffice_org-km less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046476" comment="OpenOffice_org-ko less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046477" comment="OpenOffice_org-ko less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046478" comment="OpenOffice_org-lt less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046479" comment="OpenOffice_org-lt less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046480" comment="OpenOffice_org-mk less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046481" comment="OpenOffice_org-mk less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046482" comment="OpenOffice_org-mono less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046483" comment="OpenOffice_org-mono less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046484" comment="OpenOffice_org-nb less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046485" comment="OpenOffice_org-nb less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046486" comment="OpenOffice_org-nl less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046487" comment="OpenOffice_org-nl less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046488" comment="OpenOffice_org-nn less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046489" comment="OpenOffice_org-nn less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046490" comment="OpenOffice_org-officebean less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046491" comment="OpenOffice_org-officebean less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046492" comment="OpenOffice_org-pa-IN less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046493" comment="OpenOffice_org-pa-IN less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046494" comment="OpenOffice_org-pl less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046495" comment="OpenOffice_org-pl less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046496" comment="OpenOffice_org-pt-BR less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046497" comment="OpenOffice_org-pt-BR less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046498" comment="OpenOffice_org-pt less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046499" comment="OpenOffice_org-pt less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046500" comment="OpenOffice_org-ru less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046501" comment="OpenOffice_org-ru less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046502" comment="OpenOffice_org-rw less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046503" comment="OpenOffice_org-rw less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046504" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046505" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046506" comment="OpenOffice_org-sdk less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046507" comment="OpenOffice_org-sdk less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046508" comment="OpenOffice_org-sk less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046509" comment="OpenOffice_org-sk less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046510" comment="OpenOffice_org-sl less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046511" comment="OpenOffice_org-sl less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046512" comment="OpenOffice_org-sr-CS less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046513" comment="OpenOffice_org-sr-CS less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046514" comment="OpenOffice_org-st less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046515" comment="OpenOffice_org-st less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046516" comment="OpenOffice_org-sv less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046517" comment="OpenOffice_org-sv less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046518" comment="OpenOffice_org-tr less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046519" comment="OpenOffice_org-tr less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046520" comment="OpenOffice_org-ts less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046521" comment="OpenOffice_org-ts less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046522" comment="OpenOffice_org-vi less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046523" comment="OpenOffice_org-vi less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046524" comment="OpenOffice_org-xh less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046525" comment="OpenOffice_org-xh less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046526" comment="OpenOffice_org-zh-CN less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046527" comment="OpenOffice_org-zh-CN less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046528" comment="OpenOffice_org-zh-TW less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046529" comment="OpenOffice_org-zh-TW less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046530" comment="OpenOffice_org-zu less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046531" comment="OpenOffice_org-zu less than 2.0.4-38.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046532" comment="OpenOffice_org less than 2.0.4-38.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046533" comment="OpenOffice_org less than 2.0.4-38.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4619</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619" source="CVE"/>
	<description>
	Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- e9a59a5e4f0f226aaf912fb9df671d4f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046575" comment="flac-32bit less than 1.1.2-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046576" comment="flac-64bit less than 1.1.2-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046577" comment="flac-devel less than 1.1.2-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046578" comment="flac less than 1.1.2-36"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4658</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658" source="CVE"/>
	<description>
	The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4661</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661" source="CVE"/>
	<description>
	The chunk_split function in string.c in PHP 5.2.3 does not properly calculate the needed buffer size due to precision loss when performing integer arithmetic with floating point numbers, which has unknown attack vectors and impact, possibly resulting in a heap-based buffer overflow.  NOTE: this is due to an incomplete fix for CVE-2007-2872.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4727</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727" source="CVE"/>
	<description>
	Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
	</description>
 </metadata>
<!-- a2461378f17bed0c02a787b3eae31d1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046591" comment="lighttpd-mod_cml less than 1.4.13-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046592" comment="lighttpd-mod_magnet less than 1.4.13-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046593" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046594" comment="lighttpd-mod_rrdtool less than 1.4.13-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046595" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046596" comment="lighttpd-mod_webdav less than 1.4.13-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046597" comment="lighttpd less than 1.4.13-41.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4730</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730" source="CVE"/>
	<description>
	Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
	</description>
 </metadata>
<!-- f2479b18f1f422b5b4b2ce76c46b9b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046280" comment="xorg-x11-Xvnc less than 7.1-33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046281" comment="xorg-x11-devel-32bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046282" comment="xorg-x11-devel-64bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046283" comment="xorg-x11-devel less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046284" comment="xorg-x11-doc less than 7.2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046285" comment="xorg-x11-libs-32bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046286" comment="xorg-x11-libs-64bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046287" comment="xorg-x11-libs less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046288" comment="xorg-x11-server-sdk less than 7.2-30.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046289" comment="xorg-x11-server less than 7.2-30.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046290" comment="xorg-x11 less than 7.2-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4743</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743" source="CVE"/>
	<description>
	The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.
	</description>
 </metadata>
<!-- 2d6825ac865c0da993cb65723e7379ff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045897" comment="krb5-32bit less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045898" comment="krb5-64bit less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045899" comment="krb5-apps-clients less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045900" comment="krb5-apps-servers less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045901" comment="krb5-client less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045902" comment="krb5-devel-32bit less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045903" comment="krb5-devel-64bit less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045904" comment="krb5-devel less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045905" comment="krb5-server less than 1.5.1-23.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045906" comment="krb5 less than 1.5.1-23.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4752</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752" source="CVE"/>
	<description>
	ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
	</description>
 </metadata>
<!-- 9b16515b76321f08b714d3edc01316ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046602" comment="openssh-askpass less than 4.4p1-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046603" comment="openssh less than 4.4p1-26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4768</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768" source="CVE"/>
	<description>
	Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4769</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
	</description>
 </metadata>
<!-- a3f2e9953fe05ebbe65a20b8b664737e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046613" comment="postgresql-contrib less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046614" comment="postgresql-devel less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046615" comment="postgresql-docs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046616" comment="postgresql-libs-32bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046617" comment="postgresql-libs-64bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046618" comment="postgresql-libs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046619" comment="postgresql-pl less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046620" comment="postgresql-server less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046621" comment="postgresql less than 8.1.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4770</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770" source="CVE"/>
	<description>
	libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046623" comment="OpenOffice_org-af less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046624" comment="OpenOffice_org-ar less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046625" comment="OpenOffice_org-be-BY less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046626" comment="OpenOffice_org-bg less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046627" comment="OpenOffice_org-ca less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046628" comment="OpenOffice_org-cs less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046629" comment="OpenOffice_org-cy less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046630" comment="OpenOffice_org-da less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046631" comment="OpenOffice_org-de less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046632" comment="OpenOffice_org-el less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046633" comment="OpenOffice_org-en-GB less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046634" comment="OpenOffice_org-es less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046635" comment="OpenOffice_org-et less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046636" comment="OpenOffice_org-fi less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046637" comment="OpenOffice_org-fr less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046638" comment="OpenOffice_org-galleries less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046639" comment="OpenOffice_org-gnome less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046640" comment="OpenOffice_org-gu-IN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046641" comment="OpenOffice_org-hi-IN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046642" comment="OpenOffice_org-hr less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046643" comment="OpenOffice_org-hu less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046644" comment="OpenOffice_org-it less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046645" comment="OpenOffice_org-ja less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046646" comment="OpenOffice_org-kde less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046647" comment="OpenOffice_org-km less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046648" comment="OpenOffice_org-ko less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046649" comment="OpenOffice_org-lt less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046650" comment="OpenOffice_org-mk less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046651" comment="OpenOffice_org-mono less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046652" comment="OpenOffice_org-nb less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046653" comment="OpenOffice_org-nl less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046654" comment="OpenOffice_org-nn less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046655" comment="OpenOffice_org-officebean less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046656" comment="OpenOffice_org-pa-IN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046657" comment="OpenOffice_org-pl less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046658" comment="OpenOffice_org-pt-BR less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046659" comment="OpenOffice_org-pt less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046660" comment="OpenOffice_org-ru less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046661" comment="OpenOffice_org-rw less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046662" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046663" comment="OpenOffice_org-sdk less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046664" comment="OpenOffice_org-sk less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046665" comment="OpenOffice_org-sl less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046666" comment="OpenOffice_org-sr-CS less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046667" comment="OpenOffice_org-st less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046668" comment="OpenOffice_org-sv less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046669" comment="OpenOffice_org-tr less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046670" comment="OpenOffice_org-ts less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046671" comment="OpenOffice_org-vi less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046672" comment="OpenOffice_org-xh less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046673" comment="OpenOffice_org-zh-CN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046674" comment="OpenOffice_org-zh-TW less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046675" comment="OpenOffice_org-zu less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046676" comment="OpenOffice_org less than 2.0.4-38.12"/>
		</criteria>
	</criteria>
	<!-- 8ee471087e9bdd0cabb44d02ea05622d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046687" comment="icu-data less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046688" comment="icu less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046689" comment="libicu-32bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046690" comment="libicu-64bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046691" comment="libicu-devel-32bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046692" comment="libicu-devel-64bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046693" comment="libicu-devel less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046694" comment="libicu-doc less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046695" comment="libicu less than 3.4-36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4771</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771" source="CVE"/>
	<description>
	Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046623" comment="OpenOffice_org-af less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046624" comment="OpenOffice_org-ar less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046625" comment="OpenOffice_org-be-BY less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046626" comment="OpenOffice_org-bg less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046627" comment="OpenOffice_org-ca less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046628" comment="OpenOffice_org-cs less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046629" comment="OpenOffice_org-cy less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046630" comment="OpenOffice_org-da less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046631" comment="OpenOffice_org-de less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046632" comment="OpenOffice_org-el less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046633" comment="OpenOffice_org-en-GB less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046634" comment="OpenOffice_org-es less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046635" comment="OpenOffice_org-et less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046636" comment="OpenOffice_org-fi less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046637" comment="OpenOffice_org-fr less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046638" comment="OpenOffice_org-galleries less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046639" comment="OpenOffice_org-gnome less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046640" comment="OpenOffice_org-gu-IN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046641" comment="OpenOffice_org-hi-IN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046642" comment="OpenOffice_org-hr less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046643" comment="OpenOffice_org-hu less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046644" comment="OpenOffice_org-it less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046645" comment="OpenOffice_org-ja less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046646" comment="OpenOffice_org-kde less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046647" comment="OpenOffice_org-km less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046648" comment="OpenOffice_org-ko less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046649" comment="OpenOffice_org-lt less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046650" comment="OpenOffice_org-mk less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046651" comment="OpenOffice_org-mono less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046652" comment="OpenOffice_org-nb less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046653" comment="OpenOffice_org-nl less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046654" comment="OpenOffice_org-nn less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046655" comment="OpenOffice_org-officebean less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046656" comment="OpenOffice_org-pa-IN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046657" comment="OpenOffice_org-pl less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046658" comment="OpenOffice_org-pt-BR less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046659" comment="OpenOffice_org-pt less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046660" comment="OpenOffice_org-ru less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046661" comment="OpenOffice_org-rw less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046662" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046663" comment="OpenOffice_org-sdk less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046664" comment="OpenOffice_org-sk less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046665" comment="OpenOffice_org-sl less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046666" comment="OpenOffice_org-sr-CS less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046667" comment="OpenOffice_org-st less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046668" comment="OpenOffice_org-sv less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046669" comment="OpenOffice_org-tr less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046670" comment="OpenOffice_org-ts less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046671" comment="OpenOffice_org-vi less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046672" comment="OpenOffice_org-xh less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046673" comment="OpenOffice_org-zh-CN less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046674" comment="OpenOffice_org-zh-TW less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046675" comment="OpenOffice_org-zu less than 2.0.4-38.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046676" comment="OpenOffice_org less than 2.0.4-38.12"/>
		</criteria>
	</criteria>
	<!-- 8ee471087e9bdd0cabb44d02ea05622d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046687" comment="icu-data less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046688" comment="icu less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046689" comment="libicu-32bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046690" comment="libicu-64bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046691" comment="libicu-devel-32bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046692" comment="libicu-devel-64bit less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046693" comment="libicu-devel less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046694" comment="libicu-doc less than 3.4-36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046695" comment="libicu less than 3.4-36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
	</description>
 </metadata>
<!-- a3f2e9953fe05ebbe65a20b8b664737e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046613" comment="postgresql-contrib less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046614" comment="postgresql-devel less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046615" comment="postgresql-docs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046616" comment="postgresql-libs-32bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046617" comment="postgresql-libs-64bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046618" comment="postgresql-libs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046619" comment="postgresql-pl less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046620" comment="postgresql-server less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046621" comment="postgresql less than 8.1.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4782</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782" source="CVE"/>
	<description>
	PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a "*[1]e" value.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4784</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784" source="CVE"/>
	<description>
	The setlocale function in PHP before 5.2.4 allows context-dependent attackers to cause a denial of service (application crash) via a long string in the locale parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4825</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825" source="CVE"/>
	<description>
	Directory traversal vulnerability in PHP 5.2.4 and earlier allows attackers to bypass open_basedir restrictions and possibly execute arbitrary code via a .. (dot dot) in the dl function.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4840</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840" source="CVE"/>
	<description>
	PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the out_charset parameter to the iconv function; or a long string in the charset parameter to the (2) iconv_mime_decode_headers, (3) iconv_mime_decode, or (4) iconv_strlen function.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4841</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4841" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4879</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879" source="CVE"/>
	<description>
	Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4924</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4924" source="CVE"/>
	<description>
	The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
	</description>
 </metadata>
<!-- 369adafc45f02d628303f3dcf63a94bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046715" comment="opal-devel less than 2.3.1-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046716" comment="opal less than 2.3.1-32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4965</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965" source="CVE"/>
	<description>
	Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- 7f740fb3c9a5d2ea29ade495d9f4800f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046731" comment="python-32bit less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046732" comment="python-64bit less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046733" comment="python-curses less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046734" comment="python-demo less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046735" comment="python-devel less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046736" comment="python-gdbm less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046737" comment="python-idle less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046738" comment="python-tk less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046739" comment="python-xml less than 2.5-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046740" comment="python less than 2.5-19.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4974</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974" source="CVE"/>
	<description>
	Heap-based buffer overflow in the flac_buffer_copy function in libsndfile 1.0.17 and earlier might allow remote attackers to execute arbitrary code via a FLAC file with crafted PCM data containing a block with a size that exceeds the previous block size.
	</description>
 </metadata>
<!-- 9b41fd37f8df6f72631893f7f0fb7b9f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046748" comment="libsndfile-32bit less than 1.0.17-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046749" comment="libsndfile-64bit less than 1.0.17-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046750" comment="libsndfile-devel less than 1.0.17-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046751" comment="libsndfile-octave less than 1.0.17-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046752" comment="libsndfile-progs less than 1.0.17-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046753" comment="libsndfile less than 1.0.17-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4985</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985" source="CVE"/>
	<description>
	ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046763" comment="GraphicsMagick-c++-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046764" comment="GraphicsMagick-c++ less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046765" comment="GraphicsMagick-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046766" comment="GraphicsMagick less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046767" comment="perl-GraphicsMagick less than 1.1.7-35.5"/>
		</criteria>
	</criteria>
	<!-- 6e1b2c97c9fdc85d0d6ff523ccf5008a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046773" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046774" comment="ImageMagick-Magick++ less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046775" comment="ImageMagick-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046776" comment="ImageMagick less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046777" comment="perl-PerlMagick less than 6.3.0.0-27.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4986</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986" source="CVE"/>
	<description>
	Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046763" comment="GraphicsMagick-c++-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046764" comment="GraphicsMagick-c++ less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046765" comment="GraphicsMagick-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046766" comment="GraphicsMagick less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046767" comment="perl-GraphicsMagick less than 1.1.7-35.5"/>
		</criteria>
	</criteria>
	<!-- 6e1b2c97c9fdc85d0d6ff523ccf5008a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046773" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046774" comment="ImageMagick-Magick++ less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046775" comment="ImageMagick-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046776" comment="ImageMagick less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046777" comment="perl-PerlMagick less than 6.3.0.0-27.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4987</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987" source="CVE"/>
	<description>
	Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046763" comment="GraphicsMagick-c++-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046764" comment="GraphicsMagick-c++ less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046765" comment="GraphicsMagick-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046766" comment="GraphicsMagick less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046767" comment="perl-GraphicsMagick less than 1.1.7-35.5"/>
		</criteria>
	</criteria>
	<!-- 6e1b2c97c9fdc85d0d6ff523ccf5008a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046773" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046774" comment="ImageMagick-Magick++ less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046775" comment="ImageMagick-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046776" comment="ImageMagick less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046777" comment="perl-PerlMagick less than 6.3.0.0-27.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4988</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988" source="CVE"/>
	<description>
	Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046763" comment="GraphicsMagick-c++-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046764" comment="GraphicsMagick-c++ less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046765" comment="GraphicsMagick-devel less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046766" comment="GraphicsMagick less than 1.1.7-35.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046767" comment="perl-GraphicsMagick less than 1.1.7-35.5"/>
		</criteria>
	</criteria>
	<!-- 6e1b2c97c9fdc85d0d6ff523ccf5008a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046773" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046774" comment="ImageMagick-Magick++ less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046775" comment="ImageMagick-devel less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046776" comment="ImageMagick less than 6.3.0.0-27.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046777" comment="perl-PerlMagick less than 6.3.0.0-27.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4990</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990" source="CVE"/>
	<description>
	The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
<!-- f2479b18f1f422b5b4b2ce76c46b9b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046280" comment="xorg-x11-Xvnc less than 7.1-33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046281" comment="xorg-x11-devel-32bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046282" comment="xorg-x11-devel-64bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046283" comment="xorg-x11-devel less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046284" comment="xorg-x11-doc less than 7.2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046285" comment="xorg-x11-libs-32bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046286" comment="xorg-x11-libs-64bit less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046287" comment="xorg-x11-libs less than 7.2-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046288" comment="xorg-x11-server-sdk less than 7.2-30.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046289" comment="xorg-x11-server less than 7.2-30.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046290" comment="xorg-x11 less than 7.2-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4995</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995" source="CVE"/>
	<description>
	Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- bbdf7bf6ed523619d016307da2755ac7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046786" comment="openssl-32bit less than 0.9.8d-23.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046787" comment="openssl-64bit less than 0.9.8d-23.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046788" comment="openssl-devel-32bit less than 0.9.8d-23.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046789" comment="openssl-devel-64bit less than 0.9.8d-23.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046790" comment="openssl-devel less than 0.9.8d-23.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046791" comment="openssl-doc less than 0.9.8d-23.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046792" comment="openssl less than 0.9.8d-23.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4997</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997" source="CVE"/>
	<description>
	Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5000</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- a016ac263f910815d628f1a20df4e729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046799" comment="apache2-devel less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046800" comment="apache2-doc less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046801" comment="apache2-example-pages less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046802" comment="apache2-prefork less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046803" comment="apache2-worker less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046804" comment="apache2 less than 2.2.3-24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5007</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5007" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
	</description>
 </metadata>
<!-- 2fe97c35b12835b02a1a3915f2f47f38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046807" comment="balsa less than 2.3.13-23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5116</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116" source="CVE"/>
	<description>
	Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
	</description>
 </metadata>
<!-- 8c5e12cd125d5e2ed9bcc9bfbc368173 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046814" comment="perl-32bit less than 5.8.8-34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046815" comment="perl-64bit less than 5.8.8-34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046816" comment="perl less than 5.8.8-34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5135</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135" source="CVE"/>
	<description>
	Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ce9c8b5e06be6ef057b67d173db39aff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046841" comment="openssl-32bit less than 0.9.8d-23.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046842" comment="openssl-64bit less than 0.9.8d-23.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046843" comment="openssl-devel-32bit less than 0.9.8d-23.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046844" comment="openssl-devel-64bit less than 0.9.8d-23.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046845" comment="openssl-devel less than 0.9.8d-23.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046846" comment="openssl-doc less than 0.9.8d-23.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046847" comment="openssl less than 0.9.8d-23.4"/>
		</criteria>
	</criteria>
	<!-- ee82f2198a82d11b239bd3321dd51483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046848" comment="compat-openssl097g-32bit less than 0.9.7g-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046849" comment="compat-openssl097g-64bit less than 0.9.7g-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046850" comment="compat-openssl097g less than 0.9.7g-35"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5137</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5137" source="CVE"/>
	<description>
	Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first.  NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
	</description>
 </metadata>
<!-- a1f4d3b93c6ad29137c5900546239f22 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046861" comment="tk-32bit less than 8.4.14-13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046862" comment="tk-64bit less than 8.4.14-13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046863" comment="tk-devel less than 8.4.14-13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046864" comment="tk less than 8.4.14-13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5162</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5162" source="CVE"/>
	<description>
	The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
	</description>
 </metadata>
<!-- 93fd206cf6bc176932e1872cf7b39a5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046872" comment="ruby-devel less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046873" comment="ruby-doc-html less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046874" comment="ruby-doc-ri less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046875" comment="ruby-examples less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046876" comment="ruby-test-suite less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046877" comment="ruby-tk less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046878" comment="ruby less than 1.8.5-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5197</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197" source="CVE"/>
	<description>
	Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods.
	</description>
 </metadata>
<!-- 45c55ae34910b80b14bf658831c59f97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046915" comment="bytefx-data-mysql less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046916" comment="ibm-data-db2 less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046917" comment="mono-basic less than 1.1.18-9.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046918" comment="mono-core-32bit less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046919" comment="mono-core less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046920" comment="mono-data-firebird less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046921" comment="mono-data-oracle less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046922" comment="mono-data-postgresql less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046923" comment="mono-data-sqlite less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046924" comment="mono-data-sybase less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046925" comment="mono-data less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046926" comment="mono-devel less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046927" comment="mono-extras less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046928" comment="mono-jscript less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046929" comment="mono-locale-extras less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046930" comment="mono-nunit less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046931" comment="mono-web less than 1.1.18.1-12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046932" comment="mono-winforms less than 1.1.18.1-12.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5198</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198" source="CVE"/>
	<description>
	Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
	</description>
 </metadata>
<!-- 68981f926f4df939e07de12cbc999f38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046959" comment="nagios-plugins-extras less than 1.4.5-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046960" comment="nagios-plugins less than 1.4.5-8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5200</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200" source="CVE"/>
	<description>
	hugin, as used on various operating systems including SUSE openSUSE 10.2 and 10.3, allows local users to overwrite arbitrary files via a symlink attack on the hugin_debug_optim_results.txt temporary file.
	</description>
 </metadata>
<!-- 41a84abf40d6435f47f2c333afd72f8a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046965" comment="hugin less than 0.6.1-30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5208</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208" source="CVE"/>
	<description>
	hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x before 2.7.10 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.
	</description>
 </metadata>
<!-- 7cee34af0d79ab6f02302c2ccf915215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046968" comment="hplip-hpijs less than 1.6.10-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046969" comment="hplip less than 1.6.10-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5232</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5236</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5236" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5237</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5238</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka "three vulnerabilities."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5239</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5240</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240" source="CVE"/>
	<description>
	Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5269</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269" source="CVE"/>
	<description>
	Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.
	</description>
 </metadata>
<!-- 6233c05fc252c84034004275189aff5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047020" comment="libpng-32bit less than 1.2.12-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047021" comment="libpng-64bit less than 1.2.12-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047022" comment="libpng-devel-32bit less than 1.2.12-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047023" comment="libpng-devel-64bit less than 1.2.12-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047024" comment="libpng-devel less than 1.2.12-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047025" comment="libpng less than 1.2.12-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5273</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5274</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.  NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- a356a79c407627003e7a1be8c946b43f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046993" comment="java-1_4_2-sun-alsa less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046994" comment="java-1_4_2-sun-demo less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046995" comment="java-1_4_2-sun-devel less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046996" comment="java-1_4_2-sun-jdbc less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046997" comment="java-1_4_2-sun-plugin less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046998" comment="java-1_4_2-sun-src less than 1.4.2_update16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046999" comment="java-1_4_2-sun less than 1.4.2_update16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5275</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275" source="CVE"/>
	<description>
	The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 140c8f76fc987fafe79a6a7581620944 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
	</criteria>
	<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5334</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5337</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5338</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5339</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339" source="CVE"/>
	<description>
	Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption or assert errors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 127db75378b379b060f98b531256f8dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047026" comment="MozillaThunderbird-translations less than 1.5.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047027" comment="MozillaThunderbird less than 1.5.0.14-0.1"/>
		</criteria>
	</criteria>
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5340</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340" source="CVE"/>
	<description>
	Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 127db75378b379b060f98b531256f8dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047026" comment="MozillaThunderbird-translations less than 1.5.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047027" comment="MozillaThunderbird less than 1.5.0.14-0.1"/>
		</criteria>
	</criteria>
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5380</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380" source="CVE"/>
	<description>
	Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions."
	</description>
 </metadata>
<!-- 6761b37a2b3dd98cf677b3732952800f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047031" comment="rubygem-actionpack less than 1.12.5-19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5392</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" source="CVE"/>
	<description>
	Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0585acb38f63d10b7913a678a1cc0d24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046092" comment="gpdf less than 2.10.0-82.4"/>
	</criteria>
	<!-- 1a64560332f562764a93e6b6f66bd294 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046105" comment="cups-client less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046106" comment="cups-devel less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046107" comment="cups-libs-32bit less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046108" comment="cups-libs-64bit less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046109" comment="cups-libs less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046110" comment="cups less than 1.2.7-12.7"/>
		</criteria>
	</criteria>
	<!-- a4547a5fac6802e4ca828e1905a35637 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046122" comment="poppler-devel less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046123" comment="poppler-glib less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046124" comment="poppler-qt less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046125" comment="poppler-tools less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046126" comment="poppler less than 0.5.4-33.5"/>
		</criteria>
	</criteria>
	<!-- ae5e13b76ac07f1055f34e55a6925b8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046143" comment="koffice-database-mysql less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046144" comment="koffice-database-psql less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046145" comment="koffice-database less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046146" comment="koffice-devel less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046147" comment="koffice-extra less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046148" comment="koffice-illustration less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046149" comment="koffice-planning less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046150" comment="koffice-presentation less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046151" comment="koffice-python less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046152" comment="koffice-ruby less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046153" comment="koffice-spreadsheet less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046154" comment="koffice-wordprocessing less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046155" comment="koffice less than 1.6.0-0.5"/>
		</criteria>
	</criteria>
	<!-- d063f6fa715e3c80bf0f69f3adb58fb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046164" comment="xpdf-tools less than 3.01-58.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046165" comment="xpdf less than 3.01-58.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5393</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" source="CVE"/>
	<description>
	Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0585acb38f63d10b7913a678a1cc0d24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046092" comment="gpdf less than 2.10.0-82.4"/>
	</criteria>
	<!-- 1a64560332f562764a93e6b6f66bd294 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046105" comment="cups-client less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046106" comment="cups-devel less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046107" comment="cups-libs-32bit less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046108" comment="cups-libs-64bit less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046109" comment="cups-libs less than 1.2.7-12.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046110" comment="cups less than 1.2.7-12.7"/>
		</criteria>
	</criteria>
	<!-- 50f76eca3845ae450b588f46d276e673 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047034" comment="kdegraphics3-pdf less than 3.5.5-43.5"/>
	</criteria>
	<!-- a4547a5fac6802e4ca828e1905a35637 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046122" comment="poppler-devel less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046123" comment="poppler-glib less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046124" comment="poppler-qt less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046125" comment="poppler-tools less than 0.5.4-33.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046126" comment="poppler less than 0.5.4-33.5"/>
		</criteria>
	</criteria>
	<!-- ae5e13b76ac07f1055f34e55a6925b8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046143" comment="koffice-database-mysql less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046144" comment="koffice-database-psql less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046145" comment="koffice-database less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046146" comment="koffice-devel less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046147" comment="koffice-extra less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046148" comment="koffice-illustration less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046149" comment="koffice-planning less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046150" comment="koffice-presentation less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046151" comment="koffice-python less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046152" comment="koffice-ruby less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046153" comment="koffice-spreadsheet less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046154" comment="koffice-wordprocessing less than 1.6.0-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046155" comment="koffice less than 1.6.0-0.5"/>
		</criteria>
	</criteria>
	<!-- d063f6fa715e3c80bf0f69f3adb58fb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046164" comment="xpdf-tools less than 3.01-58.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046165" comment="xpdf less than 3.01-58.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5398</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398" source="CVE"/>
	<description>
	Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
	</description>
 </metadata>
<!-- 536774cfb51ad1e7572f45d3ced6cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046335" comment="cifs-mount less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046336" comment="ldapsmb less than 1.34b-27.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046337" comment="libmsrpc-devel less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046338" comment="libmsrpc less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046339" comment="libsmbclient-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046340" comment="libsmbclient-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046341" comment="libsmbclient-devel less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046342" comment="libsmbclient less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046343" comment="samba-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046344" comment="samba-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046345" comment="samba-client-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046346" comment="samba-client-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046347" comment="samba-client less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046348" comment="samba-doc less than 3.0.23d-19.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046349" comment="samba-krb-printing less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046350" comment="samba-pdb less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046351" comment="samba-python less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046352" comment="samba-vscan less than 0.3.6b-98.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046353" comment="samba-winbind-32bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046354" comment="samba-winbind-64bit less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046355" comment="samba-winbind less than 3.0.23d-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046356" comment="samba less than 3.0.23d-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5461</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461" source="CVE"/>
	<description>
	Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5497</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497" source="CVE"/>
	<description>
	Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
	</description>
 </metadata>
<!-- 2d3611d4e548665833c54af8bbed9d92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047059" comment="e2fsprogs-32bit less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047060" comment="e2fsprogs-64bit less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047061" comment="e2fsprogs-devel-32bit less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047062" comment="e2fsprogs-devel-64bit less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047063" comment="e2fsprogs-devel less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047064" comment="e2fsprogs less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047065" comment="libcom_err-32bit less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047066" comment="libcom_err-64bit less than 1.39-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047067" comment="libcom_err less than 1.39-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5500</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5500" source="CVE"/>
	<description>
	The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5503</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503" source="CVE"/>
	<description>
	Multiple integer overflows in Cairo before 1.4.12 might allow remote attackers to execute arbitrary code, as demonstrated using a crafted PNG image with large width and height values, which is not properly handled by the read_png function.
	</description>
 </metadata>
<!-- 62705f38a006c3eaa0507045db3bee9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047105" comment="cairo-32bit less than 1.2.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047106" comment="cairo-64bit less than 1.2.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047107" comment="cairo-devel less than 1.2.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047108" comment="cairo-doc less than 1.2.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047109" comment="cairo less than 1.2.4-10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5540</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5540" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.24 allows remote attackers to overwrite functions on pages from other domains and bypass the same-origin policy via unknown vectors.
	</description>
 </metadata>
<!-- 7f39b69c8fd1115240872a5de7840d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034507" comment="opera less than 9.24-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5541</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5541" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.24, when using an "external" newsgroup or e-mail client, allows remote attackers to execute arbitrary commands via unknown vectors.
	</description>
 </metadata>
<!-- 7f39b69c8fd1115240872a5de7840d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034507" comment="opera less than 9.24-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5589</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5589" source="CVE"/>
	<description>
	Muliple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php.  NOTE: there might also be other vectors related to (3) REQUEST_URI.
	</description>
 </metadata>
<!-- bf8ecfea6b5df10d9e75fa06b7facaab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047117" comment="phpMyAdmin less than 2.9.1.1-7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5623</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623" source="CVE"/>
	<description>
	Buffer overflow in the check_snmp function in Nagios Plugins (nagios-plugins) 1.4.10 allows remote attackers to cause a denial of service (crash) via crafted snmpget replies.
	</description>
 </metadata>
<!-- 68981f926f4df939e07de12cbc999f38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046959" comment="nagios-plugins-extras less than 1.4.5-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046960" comment="nagios-plugins less than 1.4.5-8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5624</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5624" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts.
	</description>
 </metadata>
<!-- 3a56807cb39c716cb519298b66970cc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047118" comment="nagios-www less than 2.5-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047119" comment="nagios less than 2.5-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5707</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707" source="CVE"/>
	<description>
	OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute.  NOTE: this has been reported as a double free, but the reports are inconsistent.
	</description>
 </metadata>
<!-- ff4076c25ce5c9455e46f86dc37e2cae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047131" comment="openldap2-back-meta less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047132" comment="openldap2-back-perl less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047133" comment="openldap2-devel-32bit less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047134" comment="openldap2-devel-64bit less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047135" comment="openldap2-devel less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047136" comment="openldap2 less than 2.3.27-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5708</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708" source="CVE"/>
	<description>
	slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated.
	</description>
 </metadata>
<!-- ff4076c25ce5c9455e46f86dc37e2cae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047131" comment="openldap2-back-meta less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047132" comment="openldap2-back-perl less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047133" comment="openldap2-devel-32bit less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047134" comment="openldap2-devel-64bit less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047135" comment="openldap2-devel less than 2.3.27-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047136" comment="openldap2 less than 2.3.27-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5728</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5728" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
	</description>
 </metadata>
<!-- 9e1a9ecb5f09a0a7e3fcd01934df3130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045475" comment="phpPgAdmin less than 4.0.1-61.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5745</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in OpenOffice.org before 2.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted (1) Attribute and (2) Font Description records.
	</description>
 </metadata>
<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046623" comment="OpenOffice_org-af less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046624" comment="OpenOffice_org-ar less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046625" comment="OpenOffice_org-be-BY less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046626" comment="OpenOffice_org-bg less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046627" comment="OpenOffice_org-ca less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046628" comment="OpenOffice_org-cs less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046629" comment="OpenOffice_org-cy less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046630" comment="OpenOffice_org-da less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046631" comment="OpenOffice_org-de less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046632" comment="OpenOffice_org-el less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046633" comment="OpenOffice_org-en-GB less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046634" comment="OpenOffice_org-es less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046635" comment="OpenOffice_org-et less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046636" comment="OpenOffice_org-fi less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046637" comment="OpenOffice_org-fr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046638" comment="OpenOffice_org-galleries less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046639" comment="OpenOffice_org-gnome less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046640" comment="OpenOffice_org-gu-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046641" comment="OpenOffice_org-hi-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046642" comment="OpenOffice_org-hr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046643" comment="OpenOffice_org-hu less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046644" comment="OpenOffice_org-it less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046645" comment="OpenOffice_org-ja less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046646" comment="OpenOffice_org-kde less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046647" comment="OpenOffice_org-km less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046648" comment="OpenOffice_org-ko less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046649" comment="OpenOffice_org-lt less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046650" comment="OpenOffice_org-mk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046651" comment="OpenOffice_org-mono less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046652" comment="OpenOffice_org-nb less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046653" comment="OpenOffice_org-nl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046654" comment="OpenOffice_org-nn less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046655" comment="OpenOffice_org-officebean less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046656" comment="OpenOffice_org-pa-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046657" comment="OpenOffice_org-pl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046658" comment="OpenOffice_org-pt-BR less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046659" comment="OpenOffice_org-pt less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046660" comment="OpenOffice_org-ru less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046661" comment="OpenOffice_org-rw less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046662" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046663" comment="OpenOffice_org-sdk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046664" comment="OpenOffice_org-sk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046665" comment="OpenOffice_org-sl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046666" comment="OpenOffice_org-sr-CS less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046667" comment="OpenOffice_org-st less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046668" comment="OpenOffice_org-sv less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046669" comment="OpenOffice_org-tr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046670" comment="OpenOffice_org-ts less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046671" comment="OpenOffice_org-vi less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046672" comment="OpenOffice_org-xh less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046673" comment="OpenOffice_org-zh-CN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046674" comment="OpenOffice_org-zh-TW less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046675" comment="OpenOffice_org-zu less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046676" comment="OpenOffice_org less than 2.0.4-38.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5747</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted values that trigger an excessive loop and a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046623" comment="OpenOffice_org-af less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046624" comment="OpenOffice_org-ar less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046625" comment="OpenOffice_org-be-BY less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046626" comment="OpenOffice_org-bg less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046627" comment="OpenOffice_org-ca less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046628" comment="OpenOffice_org-cs less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046629" comment="OpenOffice_org-cy less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046630" comment="OpenOffice_org-da less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046631" comment="OpenOffice_org-de less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046632" comment="OpenOffice_org-el less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046633" comment="OpenOffice_org-en-GB less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046634" comment="OpenOffice_org-es less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046635" comment="OpenOffice_org-et less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046636" comment="OpenOffice_org-fi less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046637" comment="OpenOffice_org-fr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046638" comment="OpenOffice_org-galleries less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046639" comment="OpenOffice_org-gnome less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046640" comment="OpenOffice_org-gu-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046641" comment="OpenOffice_org-hi-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046642" comment="OpenOffice_org-hr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046643" comment="OpenOffice_org-hu less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046644" comment="OpenOffice_org-it less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046645" comment="OpenOffice_org-ja less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046646" comment="OpenOffice_org-kde less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046647" comment="OpenOffice_org-km less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046648" comment="OpenOffice_org-ko less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046649" comment="OpenOffice_org-lt less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046650" comment="OpenOffice_org-mk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046651" comment="OpenOffice_org-mono less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046652" comment="OpenOffice_org-nb less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046653" comment="OpenOffice_org-nl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046654" comment="OpenOffice_org-nn less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046655" comment="OpenOffice_org-officebean less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046656" comment="OpenOffice_org-pa-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046657" comment="OpenOffice_org-pl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046658" comment="OpenOffice_org-pt-BR less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046659" comment="OpenOffice_org-pt less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046660" comment="OpenOffice_org-ru less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046661" comment="OpenOffice_org-rw less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046662" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046663" comment="OpenOffice_org-sdk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046664" comment="OpenOffice_org-sk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046665" comment="OpenOffice_org-sl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046666" comment="OpenOffice_org-sr-CS less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046667" comment="OpenOffice_org-st less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046668" comment="OpenOffice_org-sv less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046669" comment="OpenOffice_org-tr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046670" comment="OpenOffice_org-ts less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046671" comment="OpenOffice_org-vi less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046672" comment="OpenOffice_org-xh less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046673" comment="OpenOffice_org-zh-CN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046674" comment="OpenOffice_org-zh-TW less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046675" comment="OpenOffice_org-zu less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046676" comment="OpenOffice_org less than 2.0.4-38.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5760</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760" source="CVE"/>
	<description>
	Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via a PassMessage request containing a large array index.
	</description>
 </metadata>
<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047147" comment="xorg-x11-devel-32bit less than 7.2-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047148" comment="xorg-x11-devel-64bit less than 7.2-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047149" comment="xorg-x11-devel less than 7.2-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047150" comment="xorg-x11-libs-32bit less than 7.2-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047151" comment="xorg-x11-libs-64bit less than 7.2-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047152" comment="xorg-x11-libs less than 7.2-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047153" comment="xorg-x11-server-sdk less than 7.2-30.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047154" comment="xorg-x11-server less than 7.2-30.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5770</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5770" source="CVE"/>
	<description>
	The (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, and (5) Net::smtp libraries in Ruby 1.8.5 and 1.8.6 do not verify that the commonName (CN) field in a server certificate matches the domain name in a request sent over SSL, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site, different components than CVE-2007-5162.
	</description>
 </metadata>
<!-- 93fd206cf6bc176932e1872cf7b39a5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046872" comment="ruby-devel less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046873" comment="ruby-doc-html less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046874" comment="ruby-doc-ri less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046875" comment="ruby-examples less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046876" comment="ruby-test-suite less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046877" comment="ruby-tk less than 1.8.5-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046878" comment="ruby less than 1.8.5-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5794</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794" source="CVE"/>
	<description>
	Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
	</description>
 </metadata>
<!-- cf6adb5f53dd0030bd643e4fe0c5f23e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047160" comment="nss_ldap-32bit less than 253-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047161" comment="nss_ldap-64bit less than 253-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047162" comment="nss_ldap less than 253-19.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5803</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5803" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360.
	</description>
 </metadata>
<!-- 3a56807cb39c716cb519298b66970cc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047118" comment="nagios-www less than 2.5-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047119" comment="nagios less than 2.5-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5846</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846" source="CVE"/>
	<description>
	The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.
	</description>
 </metadata>
<!-- f0953f323a126310971753ba345b1af7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047173" comment="net-snmp-32bit less than 5.4.rc2-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047174" comment="net-snmp-64bit less than 5.4.rc2-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047175" comment="net-snmp-devel-64bit less than 5.4.rc2-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047176" comment="net-snmp-devel less than 5.4.rc2-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047177" comment="net-snmp less than 5.4.rc2-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047178" comment="perl-SNMP less than 5.4.rc2-6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5848</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5848" source="CVE"/>
	<description>
	Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service.
	</description>
 </metadata>
<!-- d415eb946d9ec0e2c63df415ffe687df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047185" comment="cups-client less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047186" comment="cups-devel less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047187" comment="cups-libs-32bit less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047188" comment="cups-libs-64bit less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047189" comment="cups-libs less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047190" comment="cups less than 1.2.7-12.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5849</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849" source="CVE"/>
	<description>
	Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.
	</description>
 </metadata>
<!-- d415eb946d9ec0e2c63df415ffe687df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047185" comment="cups-client less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047186" comment="cups-devel less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047187" comment="cups-libs-32bit less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047188" comment="cups-libs-64bit less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047189" comment="cups-libs less than 1.2.7-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047190" comment="cups less than 1.2.7-12.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5894</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894" source="CVE"/>
	<description>
	** DISPUTED **  The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors.  NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used.  NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'auth_type' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code."
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047203" comment="krb5-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047204" comment="krb5-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047205" comment="krb5-apps-clients less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047206" comment="krb5-apps-servers less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047207" comment="krb5-client less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047208" comment="krb5-devel-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047209" comment="krb5-devel-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047210" comment="krb5-devel less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047211" comment="krb5-server less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047212" comment="krb5 less than 1.5.1-23.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5898</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898" source="CVE"/>
	<description>
	The (1) htmlentities and (2) htmlspecialchars functions in PHP before 5.2.5 accept partial multibyte sequences, which has unknown impact and attack vectors, a different issue than CVE-2006-5465.
	</description>
 </metadata>
<!-- a779f0279a0d7d0d0a81ac133beb62eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009045476" comment="apache2-mod_php5 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045477" comment="php5-bcmath less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045478" comment="php5-bz2 less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045479" comment="php5-calendar less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045480" comment="php5-ctype less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045481" comment="php5-curl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045482" comment="php5-dba less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045483" comment="php5-dbase less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045484" comment="php5-devel less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045485" comment="php5-dom less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045486" comment="php5-exif less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045487" comment="php5-fastcgi less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045488" comment="php5-ftp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045489" comment="php5-gd less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045490" comment="php5-gettext less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045491" comment="php5-gmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045492" comment="php5-hash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045493" comment="php5-iconv less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045494" comment="php5-imap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045495" comment="php5-json less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045496" comment="php5-ldap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045497" comment="php5-mbstring less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045498" comment="php5-mcrypt less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045499" comment="php5-mhash less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045500" comment="php5-mysql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045501" comment="php5-ncurses less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045502" comment="php5-odbc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045503" comment="php5-openssl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045504" comment="php5-pcntl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045505" comment="php5-pdo less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045506" comment="php5-pear less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045507" comment="php5-pgsql less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045508" comment="php5-posix less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045509" comment="php5-pspell less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045510" comment="php5-shmop less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045511" comment="php5-snmp less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045512" comment="php5-soap less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045513" comment="php5-sockets less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045514" comment="php5-sqlite less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045515" comment="php5-suhosin less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045516" comment="php5-sysvmsg less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045517" comment="php5-sysvsem less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045518" comment="php5-sysvshm less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045519" comment="php5-tidy less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045520" comment="php5-tokenizer less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045521" comment="php5-wddx less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045522" comment="php5-xmlreader less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045523" comment="php5-xmlrpc less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045524" comment="php5-xmlwriter less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045525" comment="php5-xsl less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045526" comment="php5-zip less than 5.2.5-18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009045527" comment="php5-zlib less than 5.2.5-18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5902</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902" source="CVE"/>
	<description>
	Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047203" comment="krb5-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047204" comment="krb5-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047205" comment="krb5-apps-clients less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047206" comment="krb5-apps-servers less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047207" comment="krb5-client less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047208" comment="krb5-devel-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047209" comment="krb5-devel-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047210" comment="krb5-devel less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047211" comment="krb5-server less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047212" comment="krb5 less than 1.5.1-23.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5904</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5904" source="CVE"/>
	<description>
	Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5906</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5906" source="CVE"/>
	<description>
	Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
	</description>
 </metadata>
<!-- c66a5c2d4d466e138b457ced29948a68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047222" comment="xen-devel less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047223" comment="xen-doc-html less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047224" comment="xen-doc-pdf less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047225" comment="xen-doc-ps less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047226" comment="xen-libs less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047227" comment="xen-tools-ioemu less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047228" comment="xen-tools less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047229" comment="xen less than 3.0.3_11774-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5907</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5907" source="CVE"/>
	<description>
	Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
	</description>
 </metadata>
<!-- c66a5c2d4d466e138b457ced29948a68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047222" comment="xen-devel less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047223" comment="xen-doc-html less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047224" comment="xen-doc-pdf less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047225" comment="xen-doc-ps less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047226" comment="xen-libs less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047227" comment="xen-tools-ioemu less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047228" comment="xen-tools less than 3.0.3_11774-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047229" comment="xen less than 3.0.3_11774-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5925</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925" source="CVE"/>
	<description>
	The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5935</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935" source="CVE"/>
	<description>
	Stack-based buffer overflow in hpc.c in dvips in teTeX and TeXlive 2007 and earlier allows user-assisted attackers to execute arbitrary code via a DVI file with a long href tag.
	</description>
 </metadata>
<!-- cc6bc764a565eb5ee6deb2f8b6563f08 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047243" comment="te_ams less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047244" comment="te_cont less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047245" comment="te_dvilj less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047246" comment="te_eplai less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047247" comment="te_kpath less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047248" comment="te_latex less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047249" comment="te_mpost less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047250" comment="te_nfs less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047251" comment="te_omega less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047252" comment="te_ptex less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047253" comment="te_web less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047254" comment="tetex less than 3.0-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5936</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936" source="CVE"/>
	<description>
	dvips in teTeX and TeXlive 2007 and earlier allows local users to obtain sensitive information and modify certain data by creating certain temporary files before they are processed by dviljk, which can then be read or modified in place.
	</description>
 </metadata>
<!-- cc6bc764a565eb5ee6deb2f8b6563f08 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047243" comment="te_ams less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047244" comment="te_cont less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047245" comment="te_dvilj less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047246" comment="te_eplai less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047247" comment="te_kpath less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047248" comment="te_latex less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047249" comment="te_mpost less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047250" comment="te_nfs less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047251" comment="te_omega less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047252" comment="te_ptex less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047253" comment="te_web less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047254" comment="tetex less than 3.0-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5937</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937" source="CVE"/>
	<description>
	Multiple buffer overflows in dvi2xx.c in dviljk in teTeX and TeXlive 2007 and earlier might allow user-assisted attackers to execute arbitrary code via a crafted DVI input file.
	</description>
 </metadata>
<!-- cc6bc764a565eb5ee6deb2f8b6563f08 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047243" comment="te_ams less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047244" comment="te_cont less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047245" comment="te_dvilj less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047246" comment="te_eplai less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047247" comment="te_kpath less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047248" comment="te_latex less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047249" comment="te_mpost less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047250" comment="te_nfs less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047251" comment="te_omega less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047252" comment="te_ptex less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047253" comment="te_web less than 3.0-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047254" comment="tetex less than 3.0-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5947</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947" source="CVE"/>
	<description>
	The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2271fc2aebf8d2a0baea2c49e845df54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047260" comment="epiphany-devel less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047261" comment="epiphany-doc less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047262" comment="epiphany-extensions less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047263" comment="epiphany less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034571" comment="mozilla-xulrunner181-devel less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034572" comment="mozilla-xulrunner181-l10n less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034573" comment="mozilla-xulrunner181 less than 1.8.1.10-0.1"/>
		</criteria>
	</criteria>
	<!-- 304c3c37877a092376b857d403ca4e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034574" comment="seamonkey-dom-inspector less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034575" comment="seamonkey-irc less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034576" comment="seamonkey-mail less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034577" comment="seamonkey-spellchecker less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034578" comment="seamonkey-venkman less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034579" comment="seamonkey less than 1.1.7-0.1"/>
		</criteria>
	</criteria>
	<!-- f6ab62ed78e2e37705b2342cb6d44f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034580" comment="MozillaFirefox-translations less than 2.0.0.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034581" comment="MozillaFirefox less than 2.0.0.10-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5958</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958" source="CVE"/>
	<description>
	X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047147" comment="xorg-x11-devel-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047148" comment="xorg-x11-devel-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047149" comment="xorg-x11-devel less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047150" comment="xorg-x11-libs-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047151" comment="xorg-x11-libs-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047152" comment="xorg-x11-libs less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047153" comment="xorg-x11-server-sdk less than 7.2-30.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047154" comment="xorg-x11-server less than 7.2-30.11"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044336" comment="xgl less than cvs_060522-42"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5959</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2271fc2aebf8d2a0baea2c49e845df54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047260" comment="epiphany-devel less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047261" comment="epiphany-doc less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047262" comment="epiphany-extensions less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047263" comment="epiphany less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034571" comment="mozilla-xulrunner181-devel less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034572" comment="mozilla-xulrunner181-l10n less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034573" comment="mozilla-xulrunner181 less than 1.8.1.10-0.1"/>
		</criteria>
	</criteria>
	<!-- 304c3c37877a092376b857d403ca4e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034574" comment="seamonkey-dom-inspector less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034575" comment="seamonkey-irc less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034576" comment="seamonkey-mail less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034577" comment="seamonkey-spellchecker less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034578" comment="seamonkey-venkman less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034579" comment="seamonkey less than 1.1.7-0.1"/>
		</criteria>
	</criteria>
	<!-- f6ab62ed78e2e37705b2342cb6d44f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034580" comment="MozillaFirefox-translations less than 2.0.0.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034581" comment="MozillaFirefox less than 2.0.0.10-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5960</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2271fc2aebf8d2a0baea2c49e845df54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047260" comment="epiphany-devel less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047261" comment="epiphany-doc less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047262" comment="epiphany-extensions less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047263" comment="epiphany less than 2.16.1-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034571" comment="mozilla-xulrunner181-devel less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034572" comment="mozilla-xulrunner181-l10n less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034573" comment="mozilla-xulrunner181 less than 1.8.1.10-0.1"/>
		</criteria>
	</criteria>
	<!-- 304c3c37877a092376b857d403ca4e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034574" comment="seamonkey-dom-inspector less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034575" comment="seamonkey-irc less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034576" comment="seamonkey-mail less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034577" comment="seamonkey-spellchecker less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034578" comment="seamonkey-venkman less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034579" comment="seamonkey less than 1.1.7-0.1"/>
		</criteria>
	</criteria>
	<!-- f6ab62ed78e2e37705b2342cb6d44f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034580" comment="MozillaFirefox-translations less than 2.0.0.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034581" comment="MozillaFirefox less than 2.0.0.10-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5966</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5966" source="CVE"/>
	<description>
	Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5969</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969" source="CVE"/>
	<description>
	MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5971</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971" source="CVE"/>
	<description>
	Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047203" comment="krb5-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047204" comment="krb5-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047205" comment="krb5-apps-clients less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047206" comment="krb5-apps-servers less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047207" comment="krb5-client less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047208" comment="krb5-devel-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047209" comment="krb5-devel-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047210" comment="krb5-devel less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047211" comment="krb5-server less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047212" comment="krb5 less than 1.5.1-23.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5972</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-5972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972" source="CVE"/>
	<description>
	Double free vulnerability in the krb5_def_store_mkey function in lib/kdb/kdb_default.c in MIT Kerberos 5 (krb5) 1.5 has unknown impact and remote authenticated attack vectors.  NOTE: the free operations occur in code that stores the krb5kdc master key, and so the attacker must have privileges to store this key.
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047203" comment="krb5-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047204" comment="krb5-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047205" comment="krb5-apps-clients less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047206" comment="krb5-apps-servers less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047207" comment="krb5-client less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047208" comment="krb5-devel-32bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047209" comment="krb5-devel-64bit less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047210" comment="krb5-devel less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047211" comment="krb5-server less than 1.5.1-23.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047212" comment="krb5 less than 1.5.1-23.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6015</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015" source="CVE"/>
	<description>
	Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
	</description>
 </metadata>
<!-- fd872b1500c02e0c44385c5e86e7f9f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047371" comment="cifs-mount less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047372" comment="ldapsmb less than 1.34b-27.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047373" comment="libmsrpc-devel less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047374" comment="libmsrpc less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047375" comment="libsmbclient-32bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047376" comment="libsmbclient-64bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047377" comment="libsmbclient-devel less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047378" comment="libsmbclient less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047379" comment="samba-32bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047380" comment="samba-64bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047381" comment="samba-client-32bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047382" comment="samba-client-64bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047383" comment="samba-client less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047384" comment="samba-doc less than 3.0.23d-19.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047385" comment="samba-krb-printing less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047386" comment="samba-pdb less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047387" comment="samba-python less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047388" comment="samba-vscan less than 0.3.6b-98.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047389" comment="samba-winbind-32bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047390" comment="samba-winbind-64bit less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047391" comment="samba-winbind less than 3.0.23d-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047392" comment="samba less than 3.0.23d-19.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6019</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019" source="CVE"/>
	<description>
	Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via an SWF file with a modified DeclareFunction2 Actionscript tag, which prevents an object from being instantiated properly.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6035</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6035" source="CVE"/>
	<description>
	SQL injection vulnerability in graph.php in Cacti before 0.8.7a allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.
	</description>
 </metadata>
<!-- abc9009f3f9085cc1584cfcd8830bd1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047395" comment="cacti less than 0.8.6h-36.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6063</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6063" source="CVE"/>
	<description>
	Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6067</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
	</description>
 </metadata>
<!-- a3f2e9953fe05ebbe65a20b8b664737e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046613" comment="postgresql-contrib less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046614" comment="postgresql-devel less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046615" comment="postgresql-docs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046616" comment="postgresql-libs-32bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046617" comment="postgresql-libs-64bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046618" comment="postgresql-libs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046619" comment="postgresql-pl less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046620" comment="postgresql-server less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046621" comment="postgresql less than 8.1.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6100</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6100" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in libraries/auth/cookie.auth.lib.php in phpMyAdmin before 2.11.2.2, when logins are authenticated with the cookie auth_type, allows remote attackers to inject arbitrary web script or HTML via the convcharset parameter to index.php, a different vulnerability than CVE-2005-0992.
	</description>
 </metadata>
<!-- bf8ecfea6b5df10d9e75fa06b7facaab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047117" comment="phpMyAdmin less than 2.9.1.1-7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6109</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109" source="CVE"/>
	<description>
	Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.
	</description>
 </metadata>
<!-- 66090e4409f7ffabaeca20c5462c7e23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047401" comment="emacs-el less than 21.3-254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047402" comment="emacs-info less than 21.3-254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047403" comment="emacs-nox less than 21.3-254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047404" comment="emacs-x11 less than 21.3-254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047405" comment="emacs less than 21.3-254"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6110</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6110" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in htsearch in htdig 3.2.0b6 allows remote attackers to inject arbitrary web script or HTML via the sort parameter.
	</description>
 </metadata>
<!-- e60e93ab9db057ea581d42dc85189175 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047408" comment="htdig less than 3.2.0b6-44"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6111</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6112</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112" source="CVE"/>
	<description>
	Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6113</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113" source="CVE"/>
	<description>
	Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6114</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114" source="CVE"/>
	<description>
	Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0 through 0.99.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) the SSL dissector or (2) the iSeries (OS/400) Communication trace file parser.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6115</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115" source="CVE"/>
	<description>
	Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6116</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116" source="CVE"/>
	<description>
	The Firebird/Interbase dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite loop or crash) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6117</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117" source="CVE"/>
	<description>
	Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6118</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118" source="CVE"/>
	<description>
	The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6119</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119" source="CVE"/>
	<description>
	The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6120</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120" source="CVE"/>
	<description>
	The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6121</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6130</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6130" source="CVE"/>
	<description>
	gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- 27ad7f494b59d544a34bb56221400482 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047414" comment="gnump3d less than 2.9.8-32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6151</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151" source="CVE"/>
	<description>
	The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- 9bce1c94409412a3009178726708de3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047415" comment="kernel-bigsmp less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047416" comment="kernel-default less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047417" comment="kernel-iseries64 less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047418" comment="kernel-kdump less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047419" comment="kernel-ppc64 less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047420" comment="kernel-source less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047421" comment="kernel-syms less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047422" comment="kernel-xen less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047423" comment="kernel-xenpae less than 2.6.18.8-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6167</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6167" source="CVE"/>
	<description>
	Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
	</description>
 </metadata>
<!-- 3918741e5254b437af9560dcf4aff42d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047428" comment="yast2-core-devel less than 2.14.5-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047429" comment="yast2-core less than 2.14.5-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6170</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6170" source="CVE"/>
	<description>
	SQL injection vulnerability in the Call Detail Record Postgres logging engine (cdr_pgsql) in Asterisk 1.4.x before 1.4.15, 1.2.x before 1.2.25, B.x before B.2.3.4, and C.x before C.1.0-beta6 allows remote authenticated users to execute arbitrary SQL commands via (1) ANI and (2) DNIS arguments.
	</description>
 </metadata>
<!-- 5aa24060bee78731e359770f7ebfd0cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047441" comment="asterisk-alsa less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047442" comment="asterisk-odbc less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047443" comment="asterisk-pgsql less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047444" comment="asterisk-spandsp less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047445" comment="asterisk-zaptel less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047446" comment="asterisk less than 1.2.13-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6199</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199" source="CVE"/>
	<description>
	rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
	</description>
 </metadata>
<!-- 69e817347fcd79b1b527ae7bf60dd28c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047448" comment="rsync less than 2.6.8-31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6200</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200" source="CVE"/>
	<description>
	Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
	</description>
 </metadata>
<!-- 69e817347fcd79b1b527ae7bf60dd28c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047448" comment="rsync less than 2.6.8-31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6203</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203" source="CVE"/>
	<description>
	Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
	</description>
 </metadata>
<!-- a016ac263f910815d628f1a20df4e729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046799" comment="apache2-devel less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046800" comment="apache2-doc less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046801" comment="apache2-example-pages less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046802" comment="apache2-prefork less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046803" comment="apache2-worker less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046804" comment="apache2 less than 2.2.3-24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6206</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206" source="CVE"/>
	<description>
	The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6239</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239" source="CVE"/>
	<description>
	The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
	</description>
 </metadata>
<!-- 3dd0e5b14df59b89745b1bdb1c82e53d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047451" comment="squid less than 2.6.STABLE6-0.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6242</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.0.48.0 and earlier might allow remote attackers to execute arbitrary code via unknown vectors, related to "input validation errors."
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6243</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 does not sufficiently restrict the interpretation and usage of cross-domain policy files, which makes it easier for remote attackers to conduct cross-domain and cross-site scripting (XSS) attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 140c8f76fc987fafe79a6a7581620944 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
	</criteria>
	<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
	</criteria>
	<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6244</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player 9.x up to 9.0.48.0 and 8.x up to 8.0.35.0 allow remote attackers to inject arbitrary web script or HTML via (1) a SWF file that uses the asfunction: protocol or (2) the navigateToURL function when used with the Flash Player ActiveX Control in Internet Explorer.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6245</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 allows remote attackers to modify HTTP headers for client requests and conduct HTTP Request Splitting attacks.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6246</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0, when running on Linux, uses insecure permissions for memory, which might allow local users to gain privileges.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6282</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6282" source="CVE"/>
	<description>
	The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6284</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284" source="CVE"/>
	<description>
	The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
	</description>
 </metadata>
<!-- 14bdd8f5a14b69dae71d4c08aeb0c17c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047460" comment="libxml2-32bit less than 2.6.26-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047461" comment="libxml2-64bit less than 2.6.26-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047462" comment="libxml2-devel-32bit less than 2.6.26-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047463" comment="libxml2-devel-64bit less than 2.6.26-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047464" comment="libxml2-devel less than 2.6.26-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047465" comment="libxml2-python less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047466" comment="libxml2 less than 2.6.26-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6303</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303" source="CVE"/>
	<description>
	MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6304</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304" source="CVE"/>
	<description>
	The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044952" comment="mysql-Max less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044953" comment="mysql-bench less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044954" comment="mysql-client less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044955" comment="mysql-debug less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044956" comment="mysql-devel less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044957" comment="mysql-shared-32bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044958" comment="mysql-shared-64bit less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044959" comment="mysql-shared less than 5.0.26-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044960" comment="mysql less than 5.0.26-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6335</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335" source="CVE"/>
	<description>
	Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 10c7ff521ad440127b8ad7f95c39f249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034670" comment="clamav-db less than 0.92-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6336</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336" source="CVE"/>
	<description>
	Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
	</description>
 </metadata>
<!-- 10c7ff521ad440127b8ad7f95c39f249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034670" comment="clamav-db less than 0.92-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6337</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337" source="CVE"/>
	<description>
	Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 10c7ff521ad440127b8ad7f95c39f249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034670" comment="clamav-db less than 0.92-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6351</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351" source="CVE"/>
	<description>
	libexif 0.6.16 and earlier allows context-dependent attackers to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.
	</description>
 </metadata>
<!-- d20ff93c1786150d97ea52615112a932 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047475" comment="libexif-32bit less than 0.6.14-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047476" comment="libexif-64bit less than 0.6.14-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047477" comment="libexif less than 0.6.14-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6352</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352" source="CVE"/>
	<description>
	Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 60fdfed39e2525f7e4fa91dad4193423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047479" comment="libexif5 less than 0.5.12-41"/>
	</criteria>
	<!-- d20ff93c1786150d97ea52615112a932 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047475" comment="libexif-32bit less than 0.6.14-22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047476" comment="libexif-64bit less than 0.6.14-22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047477" comment="libexif less than 0.6.14-22"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6353</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353" source="CVE"/>
	<description>
	Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 8e87ec8a273d82eb4fd400e1cf90e126 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047480" comment="libexiv2-devel less than 0.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047481" comment="libexiv2 less than 0.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6388</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- a016ac263f910815d628f1a20df4e729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046799" comment="apache2-devel less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046800" comment="apache2-doc less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046801" comment="apache2-example-pages less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046802" comment="apache2-prefork less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046803" comment="apache2-worker less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046804" comment="apache2 less than 2.2.3-24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6417</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6417" source="CVE"/>
	<description>
	The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash).
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6420</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- 8313737b969316e2d93a1a8d180ff862 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047482" comment="apache2-devel less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047483" comment="apache2-doc less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047484" comment="apache2-example-pages less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047485" comment="apache2-prefork less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047486" comment="apache2-worker less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047487" comment="apache2 less than 2.2.3-26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6421</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6421" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
	</description>
 </metadata>
<!-- a016ac263f910815d628f1a20df4e729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046799" comment="apache2-devel less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046800" comment="apache2-doc less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046801" comment="apache2-example-pages less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046802" comment="apache2-prefork less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046803" comment="apache2-worker less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046804" comment="apache2 less than 2.2.3-24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6422</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422" source="CVE"/>
	<description>
	The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
	</description>
 </metadata>
<!-- a016ac263f910815d628f1a20df4e729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046799" comment="apache2-devel less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046800" comment="apache2-doc less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046801" comment="apache2-example-pages less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046802" comment="apache2-prefork less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046803" comment="apache2-worker less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046804" comment="apache2 less than 2.2.3-24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6427</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427" source="CVE"/>
	<description>
	The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303d396acc2b78a8bb7ab1e97893272c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047514" comment="NX less than 1.5.0-77"/>
	</criteria>
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047147" comment="xorg-x11-devel-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047148" comment="xorg-x11-devel-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047149" comment="xorg-x11-devel less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047150" comment="xorg-x11-libs-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047151" comment="xorg-x11-libs-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047152" comment="xorg-x11-libs less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047153" comment="xorg-x11-server-sdk less than 7.2-30.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047154" comment="xorg-x11-server less than 7.2-30.11"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044336" comment="xgl less than cvs_060522-42"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6428</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428" source="CVE"/>
	<description>
	The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303d396acc2b78a8bb7ab1e97893272c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047514" comment="NX less than 1.5.0-77"/>
	</criteria>
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047147" comment="xorg-x11-devel-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047148" comment="xorg-x11-devel-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047149" comment="xorg-x11-devel less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047150" comment="xorg-x11-libs-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047151" comment="xorg-x11-libs-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047152" comment="xorg-x11-libs less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047153" comment="xorg-x11-server-sdk less than 7.2-30.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047154" comment="xorg-x11-server less than 7.2-30.11"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044336" comment="xgl less than cvs_060522-42"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6429</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429" source="CVE"/>
	<description>
	Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303d396acc2b78a8bb7ab1e97893272c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047514" comment="NX less than 1.5.0-77"/>
	</criteria>
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047147" comment="xorg-x11-devel-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047148" comment="xorg-x11-devel-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047149" comment="xorg-x11-devel less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047150" comment="xorg-x11-libs-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047151" comment="xorg-x11-libs-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047152" comment="xorg-x11-libs less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047153" comment="xorg-x11-server-sdk less than 7.2-30.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047154" comment="xorg-x11-server less than 7.2-30.11"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044336" comment="xgl less than cvs_060522-42"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6430</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6430" source="CVE"/>
	<description>
	Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.
	</description>
 </metadata>
<!-- 5aa24060bee78731e359770f7ebfd0cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047441" comment="asterisk-alsa less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047442" comment="asterisk-odbc less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047443" comment="asterisk-pgsql less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047444" comment="asterisk-spandsp less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047445" comment="asterisk-zaptel less than 1.2.13-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047446" comment="asterisk less than 1.2.13-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6438</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438" source="CVE"/>
	<description>
	Unspecified vulnerability in the SMB dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service via unknown vectors.  NOTE: this identifier originally included MP3 and NCP, but those issues are already covered by CVE-2007-6111.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6439</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite or large loop) via the (1) IPv6 or (2) USB dissector, which can trigger resource consumption or a crash. NOTE: this identifier originally included Firebird/Interbase, but it is already covered by CVE-2007-6116.  The DCP ETSI issue is already covered by CVE-2007-6119.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6441</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441" source="CVE"/>
	<description>
	The WiMAX dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors related to "unaligned access on some platforms."
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6450</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450" source="CVE"/>
	<description>
	The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6451</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451" source="CVE"/>
	<description>
	Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047409" comment="wireshark-devel less than 0.99.5-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047410" comment="wireshark less than 0.99.5-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6520</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520" source="CVE"/>
	<description>
	Opera before 9.25 allows remote attackers to conduct cross-domain scripting attacks via unknown vectors related to plug-ins.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6521</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.25 allows remote attackers to execute arbitrary code via crafted TLS certificates.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6522</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522" source="CVE"/>
	<description>
	The rich text editing functionality in Opera before 9.25 allows remote attackers to conduct cross-domain scripting attacks by using designMode to modify contents of pages in other domains.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6523</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6523" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in Opera 9.50 beta and 9.x before 9.25 allows remote attackers to cause a denial of service (CPU consumption) via a crafted bitmap (BMP) file that triggers a large number of calculations and checks.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6524</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524" source="CVE"/>
	<description>
	Opera before 9.25 allows remote attackers to obtain potentially sensitive memory contents via a crafted bitmap (BMP) file, as demonstrated using a CANVAS element and JavaScript in an HTML document for copying these contents from 9.50 beta, a related issue to CVE-2008-0420.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6532</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532" source="CVE"/>
	<description>
	Double free vulnerability in the Widget Library (libxfcegui4) in Xfce before 4.4.2 might allow remote attackers to execute arbitrary code via unknown vectors related to the "cliend id, program name and working directory in session management."
	</description>
 </metadata>
<!-- 5e92206d427b384a84b49bdad1dec925 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047517" comment="libxfcegui4 less than 4.2.3-36"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6595</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595" source="CVE"/>
	<description>
	ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6596</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6596" source="CVE"/>
	<description>
	ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6598</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6598" source="CVE"/>
	<description>
	Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
	</description>
 </metadata>
<!-- 9cda526d2d8d02d89c0e87864b07350a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047521" comment="dovecot less than 1.0.rc14-11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
	<description>
	PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- a3f2e9953fe05ebbe65a20b8b664737e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046613" comment="postgresql-contrib less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046614" comment="postgresql-devel less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046615" comment="postgresql-docs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046616" comment="postgresql-libs-32bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046617" comment="postgresql-libs-64bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046618" comment="postgresql-libs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046619" comment="postgresql-pl less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046620" comment="postgresql-server less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046621" comment="postgresql less than 8.1.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6601</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601" source="CVE"/>
	<description>
	The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.
	</description>
 </metadata>
<!-- a3f2e9953fe05ebbe65a20b8b664737e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046613" comment="postgresql-contrib less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046614" comment="postgresql-devel less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046615" comment="postgresql-docs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046616" comment="postgresql-libs-32bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046617" comment="postgresql-libs-64bit less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046618" comment="postgresql-libs less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046619" comment="postgresql-pl less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046620" comment="postgresql-server less than 8.1.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046621" comment="postgresql less than 8.1.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6613</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6613" source="CVE"/>
	<description>
	Stack-based buffer overflow in the print_iso9660_recurse function in iso-info (src/iso-info.c) in GNU Compact Disc Input and Control Library (libcdio) 0.79 and earlier allows context-dependent attackers to cause a denial of service (core dump) and possibly execute arbitrary code via a disk or image that contains a long joilet file name.
	</description>
 </metadata>
<!-- 56733bd590aec47d239360d16dede881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047530" comment="libcdio-32bit less than 0.77-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047531" comment="libcdio-64bit less than 0.77-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047532" comment="libcdio-devel less than 0.77-18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047533" comment="libcdio less than 0.77-18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6637</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player allow remote attackers to inject arbitrary web script or HTML via a crafted SWF file, related to "pre-generated SWF files" and Adobe Dreamweaver CS3 or Adobe Acrobat Connect.  NOTE: the asfunction: vector is already covered by CVE-2007-6244.1.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6698</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6698" source="CVE"/>
	<description>
	The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
	</description>
 </metadata>
<!-- e15950b0697ed9fee8fdd803961e8fb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047551" comment="openldap2-back-meta less than 2.3.27-30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047552" comment="openldap2-back-perl less than 2.3.27-30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047553" comment="openldap2-devel-32bit less than 2.3.27-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047554" comment="openldap2-devel-64bit less than 2.3.27-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047555" comment="openldap2-devel less than 2.3.27-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047556" comment="openldap2 less than 2.3.27-30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6712</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6712" source="CVE"/>
	<description>
	Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which causes the timer to always be expired.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6716</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2007-6716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716" source="CVE"/>
	<description>
	fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0001</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0001" source="CVE"/>
	<description>
	VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0005</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005" source="CVE"/>
	<description>
	mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
	</description>
 </metadata>
<!-- a016ac263f910815d628f1a20df4e729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046799" comment="apache2-devel less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046800" comment="apache2-doc less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046801" comment="apache2-example-pages less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046802" comment="apache2-prefork less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046803" comment="apache2-worker less than 2.2.3-24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046804" comment="apache2 less than 2.2.3-24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0006</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006" source="CVE"/>
	<description>
	Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047147" comment="xorg-x11-devel-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047148" comment="xorg-x11-devel-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047149" comment="xorg-x11-devel less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047150" comment="xorg-x11-libs-32bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047151" comment="xorg-x11-libs-64bit less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047152" comment="xorg-x11-libs less than 7.2-25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047153" comment="xorg-x11-server-sdk less than 7.2-30.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047154" comment="xorg-x11-server less than 7.2-30.11"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044336" comment="xgl less than cvs_060522-42"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0007</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007" source="CVE"/>
	<description>
	Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
	</description>
 </metadata>
<!-- 607087396f97a315b72b06b2f20559ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044721" comment="kernel-bigsmp less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044722" comment="kernel-default less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044723" comment="kernel-iseries64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044724" comment="kernel-kdump less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044725" comment="kernel-ppc64 less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044726" comment="kernel-source less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044727" comment="kernel-syms less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044728" comment="kernel-xen less than 2.6.18.8-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044729" comment="kernel-xenpae less than 2.6.18.8-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0016</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0017</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017" source="CVE"/>
	<description>
	The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0047</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047" source="CVE"/>
	<description>
	Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.
	</description>
 </metadata>
<!-- c20dec459bb942c25b5d993686984446 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047683" comment="cups-client less than 1.2.7-12.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047684" comment="cups-devel less than 1.2.7-12.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047685" comment="cups-libs-32bit less than 1.2.7-12.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047686" comment="cups-libs-64bit less than 1.2.7-12.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047687" comment="cups-libs less than 1.2.7-12.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047688" comment="cups less than 1.2.7-12.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0053</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053" source="CVE"/>
	<description>
	Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
	</description>
 </metadata>
<!-- 40e95c11d2bf2008c6700ec9264d29f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047695" comment="cups-client less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047696" comment="cups-devel less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047697" comment="cups-libs-32bit less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047698" comment="cups-libs-64bit less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047699" comment="cups-libs less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047700" comment="cups less than 1.2.7-12.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0062</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062" source="CVE"/>
	<description>
	KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047716" comment="krb5-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047717" comment="krb5-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047718" comment="krb5-apps-clients less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047719" comment="krb5-apps-servers less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047720" comment="krb5-client less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047721" comment="krb5-devel-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047722" comment="krb5-devel-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047723" comment="krb5-devel less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047724" comment="krb5-server less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047725" comment="krb5 less than 1.5.1-23.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0063</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063" source="CVE"/>
	<description>
	The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047716" comment="krb5-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047717" comment="krb5-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047718" comment="krb5-apps-clients less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047719" comment="krb5-apps-servers less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047720" comment="krb5-client less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047721" comment="krb5-devel-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047722" comment="krb5-devel-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047723" comment="krb5-devel less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047724" comment="krb5-server less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047725" comment="krb5 less than 1.5.1-23.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0072</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072" source="CVE"/>
	<description>
	Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and earlier allows remote attackers to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
	</description>
 </metadata>
<!-- ccfdb35068dd6be7ea24fc037b7bbc0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047730" comment="evolution-devel less than 2.8.2-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047731" comment="evolution-pilot less than 2.8.2-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047732" comment="evolution less than 2.8.2-9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0073</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073" source="CVE"/>
	<description>
	Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
	</description>
 </metadata>
<!-- 518150c48ccde183908967dd3e740515 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047739" comment="xine-devel less than 1.1.2-40.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047740" comment="xine-extra less than 1.1.2-40.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047741" comment="xine-lib-32bit less than 1.1.2-40.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047742" comment="xine-lib-64bit less than 1.1.2-40.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047743" comment="xine-lib less than 1.1.2-40.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047744" comment="xine-ui-32bit less than 0.99.4-84.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047745" comment="xine-ui-64bit less than 0.99.4-84.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047746" comment="xine-ui less than 0.99.4-84.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0122</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122" source="CVE"/>
	<description>
	Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
	</description>
 </metadata>
<!-- efe579212766c03e1f4009c3a65156fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047771" comment="bind-chrootenv less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047772" comment="bind-devel-64bit less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047773" comment="bind-devel less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047774" comment="bind-doc less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047775" comment="bind-libs-32bit less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047776" comment="bind-libs-64bit less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047777" comment="bind-libs less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047778" comment="bind-utils less than 9.3.2-56.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047779" comment="bind less than 9.3.2-56.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0123</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0123" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in install.php for Moodle 1.8.3, and possibly other versions before 1.8.4, allows remote attackers to inject arbitrary web script or HTML via the dbname parameter.  NOTE: this issue only exists until the installation is complete.
	</description>
 </metadata>
<!-- 6fee42aac2630323e9c6ae40418e8467 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047780" comment="moodle-af less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047781" comment="moodle-ar less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047782" comment="moodle-be less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047783" comment="moodle-bg less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047784" comment="moodle-bs less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047785" comment="moodle-ca less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047786" comment="moodle-cs less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047787" comment="moodle-da less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047788" comment="moodle-de less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047789" comment="moodle-el less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047790" comment="moodle-es less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047791" comment="moodle-et less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047792" comment="moodle-eu less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047793" comment="moodle-fa less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047794" comment="moodle-fi less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047795" comment="moodle-fr less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047796" comment="moodle-ga less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047797" comment="moodle-gl less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047798" comment="moodle-he less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047799" comment="moodle-hi less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047800" comment="moodle-hr less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047801" comment="moodle-hu less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047802" comment="moodle-id less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047803" comment="moodle-is less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047804" comment="moodle-it less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047805" comment="moodle-ja less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047806" comment="moodle-ka less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047807" comment="moodle-km less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047808" comment="moodle-kn less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047809" comment="moodle-ko less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047810" comment="moodle-lt less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047811" comment="moodle-lv less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047812" comment="moodle-mi_tn less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047813" comment="moodle-ms less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047814" comment="moodle-nl less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047815" comment="moodle-nn less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047816" comment="moodle-no less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047817" comment="moodle-pl less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047818" comment="moodle-pt less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047819" comment="moodle-ro less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047820" comment="moodle-ru less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047821" comment="moodle-sk less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047822" comment="moodle-sl less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047823" comment="moodle-so less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047824" comment="moodle-sq less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047825" comment="moodle-sr less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047826" comment="moodle-sv less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047827" comment="moodle-th less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047828" comment="moodle-tl less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047829" comment="moodle-tr less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047830" comment="moodle-uk less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047831" comment="moodle-vi less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047832" comment="moodle-zh_cn less than 1.7.2-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047833" comment="moodle less than 1.7.2-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0128</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128" source="CVE"/>
	<description>
	The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
	</description>
 </metadata>
<!-- 69c8f7e853a6ac91123e966a10cc56e9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038755" comment="apache2-mod_jk less than 4.1.30-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038756" comment="tomcat5-admin-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038757" comment="tomcat5-webapps less than 5.0.30-60"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038758" comment="tomcat5 less than 5.0.30-60"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0171</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171" source="CVE"/>
	<description>
	regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.
	</description>
 </metadata>
<!-- 4f912df5c583286348d282dbe9b2506c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047839" comment="boost-64bit less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047840" comment="boost-devel-64bit less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047841" comment="boost-devel less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047842" comment="boost-doc less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047843" comment="boost less than 1.33.1-44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0172</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0172" source="CVE"/>
	<description>
	The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
	</description>
 </metadata>
<!-- 4f912df5c583286348d282dbe9b2506c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047839" comment="boost-64bit less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047840" comment="boost-devel-64bit less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047841" comment="boost-devel less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047842" comment="boost-doc less than 1.33.1-44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047843" comment="boost less than 1.33.1-44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0225</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225" source="CVE"/>
	<description>
	Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f9bbc5c915ce83d9ecbc3570dfbfdce9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047854" comment="xine-devel less than 1.1.2-40.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047855" comment="xine-extra less than 1.1.2-40.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047856" comment="xine-lib-32bit less than 1.1.2-40.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047857" comment="xine-lib-64bit less than 1.1.2-40.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047858" comment="xine-lib less than 1.1.2-40.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0314</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314" source="CVE"/>
	<description>
	Heap-based buffer overflow in spin.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted PeSpin packed PE binary with a modified length value.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0318</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318" source="CVE"/>
	<description>
	Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- a9108f3ea754b7c2755f65ad986a7443 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034873" comment="clamav-db less than 0.92.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033747" comment="clamav less than 0.92.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0320</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320" source="CVE"/>
	<description>
	Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.
	</description>
 </metadata>
<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009046623" comment="OpenOffice_org-af less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046624" comment="OpenOffice_org-ar less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046625" comment="OpenOffice_org-be-BY less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046626" comment="OpenOffice_org-bg less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046627" comment="OpenOffice_org-ca less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046628" comment="OpenOffice_org-cs less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046629" comment="OpenOffice_org-cy less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046630" comment="OpenOffice_org-da less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046631" comment="OpenOffice_org-de less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046632" comment="OpenOffice_org-el less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046633" comment="OpenOffice_org-en-GB less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046634" comment="OpenOffice_org-es less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046635" comment="OpenOffice_org-et less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046636" comment="OpenOffice_org-fi less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046637" comment="OpenOffice_org-fr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046638" comment="OpenOffice_org-galleries less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046639" comment="OpenOffice_org-gnome less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046640" comment="OpenOffice_org-gu-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046641" comment="OpenOffice_org-hi-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046642" comment="OpenOffice_org-hr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046643" comment="OpenOffice_org-hu less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046644" comment="OpenOffice_org-it less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046645" comment="OpenOffice_org-ja less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046646" comment="OpenOffice_org-kde less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046647" comment="OpenOffice_org-km less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046648" comment="OpenOffice_org-ko less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046649" comment="OpenOffice_org-lt less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046650" comment="OpenOffice_org-mk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046651" comment="OpenOffice_org-mono less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046652" comment="OpenOffice_org-nb less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046653" comment="OpenOffice_org-nl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046654" comment="OpenOffice_org-nn less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046655" comment="OpenOffice_org-officebean less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046656" comment="OpenOffice_org-pa-IN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046657" comment="OpenOffice_org-pl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046658" comment="OpenOffice_org-pt-BR less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046659" comment="OpenOffice_org-pt less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046660" comment="OpenOffice_org-ru less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046661" comment="OpenOffice_org-rw less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046662" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046663" comment="OpenOffice_org-sdk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046664" comment="OpenOffice_org-sk less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046665" comment="OpenOffice_org-sl less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046666" comment="OpenOffice_org-sr-CS less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046667" comment="OpenOffice_org-st less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046668" comment="OpenOffice_org-sv less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046669" comment="OpenOffice_org-tr less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046670" comment="OpenOffice_org-ts less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046671" comment="OpenOffice_org-vi less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046672" comment="OpenOffice_org-xh less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046673" comment="OpenOffice_org-zh-CN less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046674" comment="OpenOffice_org-zh-TW less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046675" comment="OpenOffice_org-zu less than 2.0.4-38.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009046676" comment="OpenOffice_org less than 2.0.4-38.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0386</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386" source="CVE"/>
	<description>
	Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.
	</description>
 </metadata>
<!-- 7aa08f7c556706569bb1cb8915ee7d09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047861" comment="xdg-utils less than 1.0.1-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0411</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411" source="CVE"/>
	<description>
	Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
	</description>
 </metadata>
<!-- fe3d4251190b588f727d8e45603e1c66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047886" comment="ghostscript-fonts-other less than 8.15.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047887" comment="ghostscript-fonts-rus less than 8.15.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047888" comment="ghostscript-fonts-std less than 8.15.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047889" comment="ghostscript-library less than 8.15.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047890" comment="ghostscript-omni less than 8.15.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047891" comment="ghostscript-x11 less than 8.15.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047892" comment="libgimpprint-devel less than 4.2.7-103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047893" comment="libgimpprint less than 4.2.7-103"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0412</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0413</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.
	</description>
 </metadata>
<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0414</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0415</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0417</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417" source="CVE"/>
	<description>
	CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0418</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0419</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0420</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420" source="CVE"/>
	<description>
	modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 does not properly perform certain calculations related to the mColors table, which allows remote attackers to read portions of memory uninitialized via a crafted 8-bit bitmap (BMP) file that triggers an out-of-bounds read within the heap, as demonstrated using a CANVAS element; or cause a denial of service (application crash) via a crafted 8-bit bitmap file that triggers an out-of-bounds read. NOTE: the initial public reports stated that this affected Firefox in Ubuntu 6.06 through 7.10.
	</description>
 </metadata>
<!-- 03e9b2a76c00179921616aa76a3d63ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0486</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486" source="CVE"/>
	<description>
	Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- 08e63621c95eee7177c66e0f402012d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047921" comment="xine-devel less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047922" comment="xine-extra less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047923" comment="xine-lib-32bit less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047924" comment="xine-lib-64bit less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047925" comment="xine-lib less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047926" comment="xine-ui-32bit less than 0.99.4-84.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047927" comment="xine-ui-64bit less than 0.99.4-84.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047928" comment="xine-ui less than 0.99.4-84.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0553</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 688c3a565484bf40e245ddbbfd9a2ef7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047935" comment="tk-32bit less than 8.4.14-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047936" comment="tk-64bit less than 8.4.14-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047937" comment="tk-devel less than 8.4.14-15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047938" comment="tk less than 8.4.14-15"/>
		</criteria>
	</criteria>
	<!-- ab5a31733d5d4eb3e990eef6a50da2c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041587" comment="tkimg less than 1.3-69"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0564</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0564" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.
	</description>
 </metadata>
<!-- 9c9b5c83e5ae93eeed2887de78a0c0fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047942" comment="mailman less than 2.1.9-19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0591</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0592</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0593</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593" source="CVE"/>
	<description>
	Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047904" comment="epiphany-devel less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047905" comment="epiphany-doc less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047906" comment="epiphany-extensions less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047907" comment="epiphany less than 2.16.1-31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0594</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- b011faf50988aa365f2bb0bf758c7d04 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047902" comment="MozillaThunderbird-translations less than 1.5.0.14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047903" comment="MozillaThunderbird less than 1.5.0.14-0.3"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0595</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595" source="CVE"/>
	<description>
	dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
	</description>
 </metadata>
<!-- ddd3f3b9e356664eb09b3038752bdc01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047968" comment="dbus-1-32bit less than 1.0.0-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047969" comment="dbus-1-64bit less than 1.0.0-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047970" comment="dbus-1-devel-doc less than 1.0.0-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047971" comment="dbus-1-devel less than 1.0.0-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047972" comment="dbus-1-glib-32bit less than 0.71-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047973" comment="dbus-1-glib-64bit less than 0.71-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047974" comment="dbus-1-glib-devel less than 0.71-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047975" comment="dbus-1-glib less than 0.71-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047976" comment="dbus-1-mono less than 0.63-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047977" comment="dbus-1-python less than 0.71-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047978" comment="dbus-1-qt3-32bit less than 0.62-39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047979" comment="dbus-1-qt3-64bit less than 0.62-39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047980" comment="dbus-1-qt3-devel less than 0.62-39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047981" comment="dbus-1-qt3 less than 0.62-39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047982" comment="dbus-1-x11 less than 1.0.0-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047983" comment="dbus-1 less than 1.0.0-9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0596</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0596" source="CVE"/>
	<description>
	Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
	</description>
 </metadata>
<!-- 5eea01dfc8c788ee46a4a3f897ceae1a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047995" comment="cups-client less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047996" comment="cups-devel less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047997" comment="cups-libs-32bit less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047998" comment="cups-libs-64bit less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047999" comment="cups-libs less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048000" comment="cups less than 1.2.7-12.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0597</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597" source="CVE"/>
	<description>
	Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.
	</description>
 </metadata>
<!-- 5eea01dfc8c788ee46a4a3f897ceae1a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047995" comment="cups-client less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047996" comment="cups-devel less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047997" comment="cups-libs-32bit less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047998" comment="cups-libs-64bit less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047999" comment="cups-libs less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048000" comment="cups less than 1.2.7-12.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0600</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600" source="CVE"/>
	<description>
	The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
	</description>
 </metadata>
<!-- 9bce1c94409412a3009178726708de3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047415" comment="kernel-bigsmp less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047416" comment="kernel-default less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047417" comment="kernel-iseries64 less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047418" comment="kernel-kdump less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047419" comment="kernel-ppc64 less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047420" comment="kernel-source less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047421" comment="kernel-syms less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047422" comment="kernel-xen less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047423" comment="kernel-xenpae less than 2.6.18.8-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0655</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 3e1d1ea5f50419ba08891a752f91282f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034931" comment="acroread less than 8.1.2-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0658</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658" source="CVE"/>
	<description>
	slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
	</description>
 </metadata>
<!-- e15950b0697ed9fee8fdd803961e8fb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047551" comment="openldap2-back-meta less than 2.3.27-30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047552" comment="openldap2-back-perl less than 2.3.27-30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047553" comment="openldap2-devel-32bit less than 2.3.27-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047554" comment="openldap2-devel-64bit less than 2.3.27-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047555" comment="openldap2-devel less than 2.3.27-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047556" comment="openldap2 less than 2.3.27-30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0667</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667" source="CVE"/>
	<description>
	The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document.  NOTE: this issue might be subsumed by CVE-2008-0655.
	</description>
 </metadata>
<!-- 3e1d1ea5f50419ba08891a752f91282f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034931" comment="acroread less than 8.1.2-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0668</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668" source="CVE"/>
	<description>
	The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- ed678757e2abf73395d05650865d7274 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048139" comment="gnumeric less than 1.6.3-29"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0726</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.
	</description>
 </metadata>
<!-- 3e1d1ea5f50419ba08891a752f91282f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034931" comment="acroread less than 8.1.2-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0728</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728" source="CVE"/>
	<description>
	The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."
	</description>
 </metadata>
<!-- a9108f3ea754b7c2755f65ad986a7443 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034873" comment="clamav-db less than 0.92.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033747" comment="clamav less than 0.92.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0731</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0731" source="CVE"/>
	<description>
	The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
	</description>
 </metadata>
<!-- 9bce1c94409412a3009178726708de3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047415" comment="kernel-bigsmp less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047416" comment="kernel-default less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047417" comment="kernel-iseries64 less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047418" comment="kernel-kdump less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047419" comment="kernel-ppc64 less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047420" comment="kernel-source less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047421" comment="kernel-syms less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047422" comment="kernel-xen less than 2.6.18.8-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047423" comment="kernel-xenpae less than 2.6.18.8-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0732</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0732" source="CVE"/>
	<description>
	The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
	</description>
 </metadata>
<!-- 2b9c3cf922cf92a328134d506a872404 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048143" comment="geronimo-jetty-servlet-container less than 1.1-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048144" comment="geronimo-tomcat-servlet-container less than 1.1-23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048145" comment="geronimo less than 1.1-23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0783</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0783" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote attackers to inject arbitrary web script or HTML via (1) the view_type parameter to graph.php; (2) the filter parameter to graph_view.php; (3) the action parameter to the draw_navigation_text function in lib/functions.php, reachable through index.php (aka the login page) or data_input.php; or (4) the login_username parameter to index.php.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048147" comment="cacti less than 0.8.6h-36.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0784</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0784" source="CVE"/>
	<description>
	graph.php in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allows remote attackers to obtain the full path via an invalid local_graph_id parameter and other unspecified vectors.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048147" comment="cacti less than 0.8.6h-36.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0785</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote authenticated users to execute arbitrary SQL commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id parameter to graph_xport.php, and (4) login_username parameter to index.php/login.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048147" comment="cacti less than 0.8.6h-36.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0786</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0786" source="CVE"/>
	<description>
	CRLF injection vulnerability in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k, when running on older PHP interpreters, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048147" comment="cacti less than 0.8.6h-36.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0882</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882" source="CVE"/>
	<description>
	Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 5eea01dfc8c788ee46a4a3f897ceae1a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047995" comment="cups-client less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047996" comment="cups-devel less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047997" comment="cups-libs-32bit less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047998" comment="cups-libs-64bit less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047999" comment="cups-libs less than 1.2.7-12.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048000" comment="cups less than 1.2.7-12.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0883</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0883" source="CVE"/>
	<description>
	acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.
	</description>
 </metadata>
<!-- ca8b938258caef518d1257096269d66e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034942" comment="acroread less than 8.1.2-1.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0887</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887" source="CVE"/>
	<description>
	gnome-screensaver before 2.22.1, when a remote authentication server is enabled, crashes upon an unlock attempt during a network outage, which allows physically proximate attackers to gain access to the locked session, a related issue to CVE-2007-1859.
	</description>
 </metadata>
<!-- 2b1e5465767ba40e552a46140772107f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048150" comment="gnome-screensaver less than 2.16.1-30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0888</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888" source="CVE"/>
	<description>
	The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.
	</description>
 </metadata>
<!-- d3ce9d2927e4dfa8d896cb2244d4b88e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048153" comment="unzip less than 5.52-36"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0947</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947" source="CVE"/>
	<description>
	Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047716" comment="krb5-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047717" comment="krb5-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047718" comment="krb5-apps-clients less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047719" comment="krb5-apps-servers less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047720" comment="krb5-client less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047721" comment="krb5-devel-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047722" comment="krb5-devel-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047723" comment="krb5-devel less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047724" comment="krb5-server less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047725" comment="krb5 less than 1.5.1-23.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0948</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948" source="CVE"/>
	<description>
	Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047716" comment="krb5-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047717" comment="krb5-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047718" comment="krb5-apps-clients less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047719" comment="krb5-apps-servers less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047720" comment="krb5-client less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047721" comment="krb5-devel-32bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047722" comment="krb5-devel-64bit less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047723" comment="krb5-devel less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047724" comment="krb5-server less than 1.5.1-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047725" comment="krb5 less than 1.5.1-23.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0960</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960" source="CVE"/>
	<description>
	SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
	</description>
 </metadata>
<!-- 5c5533dfe70147c9aaa62dc81727e486 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048156" comment="net-snmp-32bit less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048157" comment="net-snmp-64bit less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048158" comment="net-snmp-devel-64bit less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048159" comment="net-snmp-devel less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048160" comment="net-snmp less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048161" comment="perl-SNMP less than 5.4.rc2-8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0983</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-0983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0983" source="CVE"/>
	<description>
	lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.
	</description>
 </metadata>
<!-- 807198b51cac8ff675e1626c5bfd8cb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048190" comment="lighttpd-mod_cml less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048191" comment="lighttpd-mod_magnet less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048192" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048193" comment="lighttpd-mod_rrdtool less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048194" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048195" comment="lighttpd-mod_webdav less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048196" comment="lighttpd less than 1.4.13-41.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1066</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1066" source="CVE"/>
	<description>
	The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
	</description>
 </metadata>
<!-- c869ca6ab2647d6db29f95ac8de08a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048197" comment="moodle-af less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048198" comment="moodle-ar less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048199" comment="moodle-be less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048200" comment="moodle-bg less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048201" comment="moodle-bs less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048202" comment="moodle-ca less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048203" comment="moodle-cs less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048204" comment="moodle-da less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048205" comment="moodle-de less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048206" comment="moodle-el less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048207" comment="moodle-es less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048208" comment="moodle-et less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048209" comment="moodle-eu less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048210" comment="moodle-fa less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048211" comment="moodle-fi less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048212" comment="moodle-fr less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048213" comment="moodle-ga less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048214" comment="moodle-gl less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048215" comment="moodle-he less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048216" comment="moodle-hi less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048217" comment="moodle-hr less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048218" comment="moodle-hu less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048219" comment="moodle-id less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048220" comment="moodle-is less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048221" comment="moodle-it less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048222" comment="moodle-ja less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048223" comment="moodle-ka less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048224" comment="moodle-km less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048225" comment="moodle-kn less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048226" comment="moodle-ko less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048227" comment="moodle-lt less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048228" comment="moodle-lv less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048229" comment="moodle-mi_tn less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048230" comment="moodle-ms less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048231" comment="moodle-nl less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048232" comment="moodle-nn less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048233" comment="moodle-no less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048234" comment="moodle-pl less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048235" comment="moodle-pt less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048236" comment="moodle-ro less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048237" comment="moodle-ru less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048238" comment="moodle-sk less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048239" comment="moodle-sl less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048240" comment="moodle-so less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048241" comment="moodle-sq less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048242" comment="moodle-sr less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048243" comment="moodle-sv less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048244" comment="moodle-th less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048245" comment="moodle-tl less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048246" comment="moodle-tr less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048247" comment="moodle-uk less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048248" comment="moodle-vi less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048249" comment="moodle-zh_cn less than 1.7.2-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048250" comment="moodle less than 1.7.2-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1070</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070" source="CVE"/>
	<description>
	The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 899a275bcffe343645eb5dd237bb631a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048253" comment="wireshark-devel less than 0.99.5-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048254" comment="wireshark less than 0.99.5-5.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1071</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071" source="CVE"/>
	<description>
	The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 899a275bcffe343645eb5dd237bb631a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048253" comment="wireshark-devel less than 0.99.5-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048254" comment="wireshark less than 0.99.5-5.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1072</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072" source="CVE"/>
	<description>
	The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug.
	</description>
 </metadata>
<!-- 899a275bcffe343645eb5dd237bb631a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048253" comment="wireshark-devel less than 0.99.5-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048254" comment="wireshark less than 0.99.5-5.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1080</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080" source="CVE"/>
	<description>
	Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input.
	</description>
 </metadata>
<!-- 98ccccf4a62112cba9131015217021f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035018" comment="opera less than 9.26-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1081</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081" source="CVE"/>
	<description>
	Opera before 9.26 allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties.
	</description>
 </metadata>
<!-- 98ccccf4a62112cba9131015217021f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035018" comment="opera less than 9.26-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1082</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082" source="CVE"/>
	<description>
	Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.
	</description>
 </metadata>
<!-- 98ccccf4a62112cba9131015217021f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035018" comment="opera less than 9.26-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1096</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096" source="CVE"/>
	<description>
	The load_tile function in the XCF coder in coders/xcf.c in (1) ImageMagick 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write, possibly related to the ScaleCharToQuantum function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 661a415b78f29372d73afd35cc7e7377 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048260" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048261" comment="ImageMagick-Magick++ less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048262" comment="ImageMagick-devel less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048263" comment="ImageMagick less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048264" comment="perl-PerlMagick less than 6.3.0.0-27.10"/>
		</criteria>
	</criteria>
	<!-- 96ed1ef1b937b772ab6bfe8fdb3e84bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048265" comment="GraphicsMagick-c++-devel less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048266" comment="GraphicsMagick-c++ less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048267" comment="GraphicsMagick-devel less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048268" comment="GraphicsMagick less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048269" comment="perl-GraphicsMagick less than 1.1.7-35.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1097</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 661a415b78f29372d73afd35cc7e7377 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048260" comment="ImageMagick-Magick++-devel less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048261" comment="ImageMagick-Magick++ less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048262" comment="ImageMagick-devel less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048263" comment="ImageMagick less than 6.3.0.0-27.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048264" comment="perl-PerlMagick less than 6.3.0.0-27.10"/>
		</criteria>
	</criteria>
	<!-- 96ed1ef1b937b772ab6bfe8fdb3e84bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048265" comment="GraphicsMagick-c++-devel less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048266" comment="GraphicsMagick-c++ less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048267" comment="GraphicsMagick-devel less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048268" comment="GraphicsMagick less than 1.1.7-35.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048269" comment="perl-GraphicsMagick less than 1.1.7-35.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1100</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100" source="CVE"/>
	<description>
	Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1105</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105" source="CVE"/>
	<description>
	Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
	</description>
 </metadata>
<!-- 5cca1d3789ec2462e2a4a9344dd530e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048290" comment="cifs-mount less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048291" comment="ldapsmb less than 1.34b-27.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048292" comment="libmsrpc-devel less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048293" comment="libmsrpc less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048294" comment="libsmbclient-32bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048295" comment="libsmbclient-64bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048296" comment="libsmbclient-devel less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048297" comment="libsmbclient less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048298" comment="samba-32bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048299" comment="samba-64bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048300" comment="samba-client-32bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048301" comment="samba-client-64bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048302" comment="samba-client less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048303" comment="samba-krb-printing less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048304" comment="samba-pdb less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048305" comment="samba-python less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048306" comment="samba-vscan less than 0.3.6b-98.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048307" comment="samba-winbind-32bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048308" comment="samba-winbind-64bit less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048309" comment="samba-winbind less than 3.0.23d-19.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048310" comment="samba less than 3.0.23d-19.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1108</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108" source="CVE"/>
	<description>
	Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote attackers to execute arbitrary code via a long timezone string in an iCalendar attachment.
	</description>
 </metadata>
<!-- f49898a4b07394548c53fdf795154405 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048356" comment="evolution-devel less than 2.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048357" comment="evolution-pilot less than 2.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048358" comment="evolution less than 2.8.2-11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1109</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109" source="CVE"/>
	<description>
	Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote attackers to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).
	</description>
 </metadata>
<!-- f49898a4b07394548c53fdf795154405 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048356" comment="evolution-devel less than 2.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048357" comment="evolution-pilot less than 2.8.2-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048358" comment="evolution less than 2.8.2-11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1111</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1111" source="CVE"/>
	<description>
	mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 807198b51cac8ff675e1626c5bfd8cb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048190" comment="lighttpd-mod_cml less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048191" comment="lighttpd-mod_magnet less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048192" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048193" comment="lighttpd-mod_rrdtool less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048194" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048195" comment="lighttpd-mod_webdav less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048196" comment="lighttpd less than 1.4.13-41.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1142</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142" source="CVE"/>
	<description>
	rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections.  NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected.  NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
	</description>
 </metadata>
<!-- 8bf75a0d68acecd2887398f1ed38be88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048359" comment="rxvt-unicode less than 7.9-26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1145</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1145" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1149</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1149" source="CVE"/>
	<description>
	phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross-Site Request Forgery (CSRF) attacks by using crafted cookies.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048382" comment="phpMyAdmin less than 2.9.1.1-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1161</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1161" source="CVE"/>
	<description>
	Buffer overflow in the Matroska demuxer (demuxers/demux_matroska.c) in xine-lib before 1.1.10.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Matroska file with invalid frame sizes.
	</description>
 </metadata>
<!-- 08e63621c95eee7177c66e0f402012d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047921" comment="xine-devel less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047922" comment="xine-extra less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047923" comment="xine-lib-32bit less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047924" comment="xine-lib-64bit less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047925" comment="xine-lib less than 1.1.2-40.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047926" comment="xine-ui-32bit less than 0.99.4-84.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047927" comment="xine-ui-64bit less than 0.99.4-84.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047928" comment="xine-ui less than 0.99.4-84.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1167</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167" source="CVE"/>
	<description>
	Stack-based buffer overflow in the useragent function in useragent.c in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 0471e0794e2c5250961aece3383ce818 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048384" comment="sarg less than 2.2.2-22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1168</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent header, which is not properly handled when displaying the Squid proxy log.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- 0471e0794e2c5250961aece3383ce818 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048384" comment="sarg less than 2.2.2-22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1185</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186, aka "the first issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1186</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 5.0 Update 13 and earlier, and SDK/JRE 1.4.2_16 and earlier, allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1185, aka "the second issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1187</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1188</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188" source="CVE"/>
	<description>
	Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1189</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189" source="CVE"/>
	<description>
	Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the "third" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1190</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the "fourth" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1191</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1192</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1193</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to gain privileges via an untrusted application.
	</description>
 </metadata>
<!-- f7102b47ce4bb241c3132b3647d5d4db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1194</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- f7102b47ce4bb241c3132b3647d5d4db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1195</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1196</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bf0c57a195152d2aea5f6c5691b56ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048392" comment="java-1_4_2-sun-alsa less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048393" comment="java-1_4_2-sun-demo less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048394" comment="java-1_4_2-sun-devel less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048395" comment="java-1_4_2-sun-jdbc less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048396" comment="java-1_4_2-sun-plugin less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048397" comment="java-1_4_2-sun-src less than 1.4.2_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048398" comment="java-1_4_2-sun less than 1.4.2_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048406" comment="java-1_5_0-sun-alsa less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048407" comment="java-1_5_0-sun-demo less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048408" comment="java-1_5_0-sun-devel less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048409" comment="java-1_5_0-sun-jdbc less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048410" comment="java-1_5_0-sun-plugin less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048411" comment="java-1_5_0-sun-src less than 1.5.0_update14-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048412" comment="java-1_5_0-sun less than 1.5.0_update14-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1199</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1199" source="CVE"/>
	<description>
	Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
	</description>
 </metadata>
<!-- 9cda526d2d8d02d89c0e87864b07350a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047521" comment="dovecot less than 1.0.rc14-11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1218</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218" source="CVE"/>
	<description>
	Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
	</description>
 </metadata>
<!-- 9cda526d2d8d02d89c0e87864b07350a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047521" comment="dovecot less than 1.0.rc14-11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1232</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
	</description>
 </metadata>
<!-- 20925bda7ad6cf2fae40c70629a57241 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048413" comment="tomcat5-admin-webapps less than 5.0.30-65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048414" comment="tomcat5-webapps less than 5.0.30-65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048415" comment="tomcat5 less than 5.0.30-65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1233</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 86e4b9ab6f4e57c7dc6eb5ff98fdadcb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048427" comment="MozillaThunderbird-translations less than 1.5.0.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048428" comment="MozillaThunderbird less than 1.5.0.14-0.5"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1234</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 86e4b9ab6f4e57c7dc6eb5ff98fdadcb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048427" comment="MozillaThunderbird-translations less than 1.5.0.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048428" comment="MozillaThunderbird less than 1.5.0.14-0.5"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1235</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 86e4b9ab6f4e57c7dc6eb5ff98fdadcb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048427" comment="MozillaThunderbird-translations less than 1.5.0.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048428" comment="MozillaThunderbird less than 1.5.0.14-0.5"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1236</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 86e4b9ab6f4e57c7dc6eb5ff98fdadcb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048427" comment="MozillaThunderbird-translations less than 1.5.0.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048428" comment="MozillaThunderbird less than 1.5.0.14-0.5"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1237</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6db438c80b88b371b0ff9baa360f5a4c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035097" comment="MozillaFirefox-translations less than 2.0.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035098" comment="MozillaFirefox less than 2.0.0.14-0.1"/>
		</criteria>
	</criteria>
	<!-- 86e4b9ab6f4e57c7dc6eb5ff98fdadcb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048427" comment="MozillaThunderbird-translations less than 1.5.0.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048428" comment="MozillaThunderbird less than 1.5.0.14-0.5"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1238</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1240</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240" source="CVE"/>
	<description>
	LiveConnect in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 does not properly parse the content origin for jar: URIs before sending them to the Java plugin, which allows remote attackers to access arbitrary ports on the local machine.  NOTE: this is closely related to CVE-2008-1195.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1241</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009046704" comment="epiphany-devel less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046705" comment="epiphany-doc less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046706" comment="epiphany-extensions less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009046707" comment="epiphany less than 2.16.1-32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1270</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270" source="CVE"/>
	<description>
	mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.
	</description>
 </metadata>
<!-- 807198b51cac8ff675e1626c5bfd8cb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048190" comment="lighttpd-mod_cml less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048191" comment="lighttpd-mod_magnet less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048192" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048193" comment="lighttpd-mod_rrdtool less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048194" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048195" comment="lighttpd-mod_webdav less than 1.4.13-41.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048196" comment="lighttpd less than 1.4.13-41.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1284</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284" source="CVE"/>
	<description>
	Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
	</description>
 </metadata>
<!-- 053dcf38e8e9d6fdeeb7f45d6ec75497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048431" comment="horde less than 3.1.3-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1290</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290" source="CVE"/>
	<description>
	ViewVC before 1.0.5 includes "all-forbidden" files within search results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 3e98780dca4b5d3f502d07c3558db551 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048440" comment="viewvc less than 1.0.1-39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1291</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291" source="CVE"/>
	<description>
	ViewVC before 1.0.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read files and list folders under the hidden CVSROOT folder.
	</description>
 </metadata>
<!-- 3e98780dca4b5d3f502d07c3558db551 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048440" comment="viewvc less than 1.0.1-39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1292</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292" source="CVE"/>
	<description>
	ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.
	</description>
 </metadata>
<!-- 3e98780dca4b5d3f502d07c3558db551 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048440" comment="viewvc less than 1.0.1-39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1332</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332" source="CVE"/>
	<description>
	Unspecified vulnerability in Asterisk Open Source 1.2.x before 1.2.27, 1.4.x before 1.4.18.1 and 1.4.19-rc3; Business Edition A.x.x, B.x.x before B.2.5.1, and C.x.x before C.1.6.2; AsteriskNOW 1.0.x before 1.0.2; Appliance Developer Kit before 1.4 revision 109393; and s800i 1.0.x before 1.1.0.2; allows remote attackers to access the SIP channel driver via a crafted From header.
	</description>
 </metadata>
<!-- 805f106e5a76706c403cf76161bae2d6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048461" comment="asterisk-alsa less than 1.2.13-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048462" comment="asterisk-odbc less than 1.2.13-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048463" comment="asterisk-pgsql less than 1.2.13-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048464" comment="asterisk-spandsp less than 1.2.13-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048465" comment="asterisk-zaptel less than 1.2.13-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048466" comment="asterisk less than 1.2.13-29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1360</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1360" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624.
	</description>
 </metadata>
<!-- 3a56807cb39c716cb519298b66970cc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047118" comment="nagios-www less than 2.5-28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047119" comment="nagios less than 2.5-28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1367</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367" source="CVE"/>
	<description>
	gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1372</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372" source="CVE"/>
	<description>
	bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- 845789df8b09692b1eaba2953e10f06a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048471" comment="bzip2-32bit less than 1.0.3-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048472" comment="bzip2-64bit less than 1.0.3-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048473" comment="bzip2 less than 1.0.3-39.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1373</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373" source="CVE"/>
	<description>
	Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- 40e95c11d2bf2008c6700ec9264d29f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047695" comment="cups-client less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047696" comment="cups-devel less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047697" comment="cups-libs-32bit less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047698" comment="cups-libs-64bit less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047699" comment="cups-libs less than 1.2.7-12.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047700" comment="cups less than 1.2.7-12.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1375</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375" source="CVE"/>
	<description>
	Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1377</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377" source="CVE"/>
	<description>
	The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 168a4e311a76021ddb0b65273348544a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045873" comment="xorg-x11-server-sdk less than 7.2-30.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045874" comment="xorg-x11-server less than 7.2-30.15"/>
		</criteria>
	</criteria>
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048483" comment="xgl less than cvs_060522-45"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1379</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379" source="CVE"/>
	<description>
	Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 168a4e311a76021ddb0b65273348544a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045873" comment="xorg-x11-server-sdk less than 7.2-30.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045874" comment="xorg-x11-server less than 7.2-30.15"/>
		</criteria>
	</criteria>
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048483" comment="xgl less than cvs_060522-45"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1380</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page.  NOTE: this is due to an incorrect fix for CVE-2008-1237.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24a736dce3c163ecdf7f810777ba0b87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048491" comment="epiphany-devel less than 2.16.1-33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048492" comment="epiphany-doc less than 2.16.1-33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048493" comment="epiphany-extensions less than 2.16.1-33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048494" comment="epiphany less than 2.16.1-33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035112" comment="mozilla-xulrunner181-32bit less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035114" comment="mozilla-xulrunner181-devel less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035115" comment="mozilla-xulrunner181-l10n less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035116" comment="mozilla-xulrunner181 less than 1.8.1.14-0.2"/>
		</criteria>
	</criteria>
	<!-- 6db438c80b88b371b0ff9baa360f5a4c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035097" comment="MozillaFirefox-translations less than 2.0.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035098" comment="MozillaFirefox less than 2.0.0.14-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1382</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382" source="CVE"/>
	<description>
	libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
	</description>
 </metadata>
<!-- 900e59676ac7750e1311c79fd1f7af15 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048507" comment="libpng-32bit less than 1.2.12-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048508" comment="libpng-64bit less than 1.2.12-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048509" comment="libpng-devel-32bit less than 1.2.12-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048510" comment="libpng-devel-64bit less than 1.2.12-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048511" comment="libpng-devel less than 1.2.12-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048512" comment="libpng less than 1.2.12-29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1384</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384" source="CVE"/>
	<description>
	Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048513" comment="apache2-mod_php5 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048514" comment="php5-bcmath less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048515" comment="php5-bz2 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048516" comment="php5-calendar less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048517" comment="php5-ctype less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048518" comment="php5-curl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048519" comment="php5-dba less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048520" comment="php5-dbase less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048521" comment="php5-devel less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048522" comment="php5-dom less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048523" comment="php5-exif less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048524" comment="php5-fastcgi less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048525" comment="php5-ftp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048526" comment="php5-gd less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048527" comment="php5-gettext less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048528" comment="php5-gmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048529" comment="php5-hash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048530" comment="php5-iconv less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048531" comment="php5-imap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048532" comment="php5-json less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048533" comment="php5-ldap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048534" comment="php5-mbstring less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048535" comment="php5-mcrypt less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048536" comment="php5-mhash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048537" comment="php5-mysql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048538" comment="php5-ncurses less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048539" comment="php5-odbc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048540" comment="php5-openssl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048541" comment="php5-pcntl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048542" comment="php5-pdo less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048543" comment="php5-pear less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048544" comment="php5-pgsql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048545" comment="php5-posix less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048546" comment="php5-pspell less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048547" comment="php5-readline less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048548" comment="php5-shmop less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048549" comment="php5-snmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048550" comment="php5-soap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048551" comment="php5-sockets less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048552" comment="php5-sqlite less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048553" comment="php5-suhosin less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048554" comment="php5-sysvmsg less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048555" comment="php5-sysvsem less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048556" comment="php5-sysvshm less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048557" comment="php5-tidy less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048558" comment="php5-tokenizer less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048559" comment="php5-wddx less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048560" comment="php5-xmlreader less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048561" comment="php5-xmlrpc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048562" comment="php5-xmlwriter less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048563" comment="php5-xsl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048564" comment="php5-zip less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048565" comment="php5-zlib less than 5.2.6-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1387</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387" source="CVE"/>
	<description>
	ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1389</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389" source="CVE"/>
	<description>
	libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1419</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419" source="CVE"/>
	<description>
	Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.
	</description>
 </metadata>
<!-- 13500b866bb97a3f03480e68c5406b49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048571" comment="libvorbis-32bit less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048572" comment="libvorbis-64bit less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048573" comment="libvorbis-devel less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048574" comment="libvorbis less than 1.1.2-37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
	<description>
	Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 13500b866bb97a3f03480e68c5406b49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048571" comment="libvorbis-32bit less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048572" comment="libvorbis-64bit less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048573" comment="libvorbis-devel less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048574" comment="libvorbis less than 1.1.2-37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1423</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423" source="CVE"/>
	<description>
	Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 13500b866bb97a3f03480e68c5406b49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048571" comment="libvorbis-32bit less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048572" comment="libvorbis-64bit less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048573" comment="libvorbis-devel less than 1.1.2-37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048574" comment="libvorbis less than 1.1.2-37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1447</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447" source="CVE"/>
	<description>
	The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0751f29b41ad4aa88d3d283b72aca89d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048575" comment="bind-chrootenv less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048576" comment="bind-devel-64bit less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048577" comment="bind-devel less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048578" comment="bind-doc less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048579" comment="bind-libs-32bit less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048580" comment="bind-libs-64bit less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048581" comment="bind-libs less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048582" comment="bind-utils less than 9.3.5P1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048583" comment="bind less than 9.3.5P1-0.1"/>
		</criteria>
	</criteria>
	<!-- 3ea73f18ea8e55bcc2626bbf75feb4ad -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035193" comment="dnsmasq less than 2.45-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1468</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1468" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e04c326193460a44f9943e087f044694 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035194" comment="namazu-cgi less than 2.0.18-24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035195" comment="namazu-devel less than 2.0.18-24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035196" comment="namazu less than 2.0.18-24.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1482</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482" source="CVE"/>
	<description>
	Multiple integer overflows in xine-lib 1.1.11 and earlier allow remote attackers to trigger heap-based buffer overflows and possibly execute arbitrary code via (1) a crafted .FLV file, which triggers an overflow in demuxers/demux_flv.c; (2) a crafted .MOV file, which triggers an overflow in demuxers/demux_qt.c; (3) a crafted .RM file, which triggers an overflow in demuxers/demux_real.c; (4) a crafted .MVE file, which triggers an overflow in demuxers/demux_wc3movie.c; (5) a crafted .MKV file, which triggers an overflow in demuxers/ebml.c; or (6) a crafted .CAK file, which triggers an overflow in demuxers/demux_film.c.
	</description>
 </metadata>
<!-- efac2f190600fb5f3b729d7b86cf58fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048626" comment="xine-devel less than 1.1.2-40.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048627" comment="xine-extra less than 1.1.2-40.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048628" comment="xine-lib-32bit less than 1.1.2-40.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048629" comment="xine-lib-64bit less than 1.1.2-40.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048630" comment="xine-lib less than 1.1.2-40.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048631" comment="xine-ui-32bit less than 0.99.4-84.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048632" comment="xine-ui-64bit less than 0.99.4-84.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048633" comment="xine-ui less than 0.99.4-84.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
	<description>
	OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
	</description>
 </metadata>
<!-- 90f94006762e9327d42eb5e9236da67a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048638" comment="openssh-askpass less than 4.4p1-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048639" comment="openssh less than 4.4p1-29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1502</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502" source="CVE"/>
	<description>
	The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
	</description>
 </metadata>
<!-- ce76c562de6267f6fff1db814d14daac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048640" comment="moodle-af less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048641" comment="moodle-ar less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048642" comment="moodle-be less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048643" comment="moodle-bg less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048644" comment="moodle-bs less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048645" comment="moodle-ca less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048646" comment="moodle-cs less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048647" comment="moodle-da less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048648" comment="moodle-de less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048649" comment="moodle-el less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048650" comment="moodle-es less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048651" comment="moodle-et less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048652" comment="moodle-eu less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048653" comment="moodle-fa less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048654" comment="moodle-fi less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048655" comment="moodle-fr less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048656" comment="moodle-ga less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048657" comment="moodle-gl less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048658" comment="moodle-he less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048659" comment="moodle-hi less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048660" comment="moodle-hr less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048661" comment="moodle-hu less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048662" comment="moodle-id less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048663" comment="moodle-is less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048664" comment="moodle-it less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048665" comment="moodle-ja less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048666" comment="moodle-ka less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048667" comment="moodle-km less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048668" comment="moodle-kn less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048669" comment="moodle-ko less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048670" comment="moodle-lt less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048671" comment="moodle-lv less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048672" comment="moodle-mi_tn less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048673" comment="moodle-ms less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048674" comment="moodle-nl less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048675" comment="moodle-nn less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048676" comment="moodle-no less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048677" comment="moodle-pl less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048678" comment="moodle-pt less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048679" comment="moodle-ro less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048680" comment="moodle-ru less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048681" comment="moodle-sk less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048682" comment="moodle-sl less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048683" comment="moodle-so less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048684" comment="moodle-sq less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048685" comment="moodle-sr less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048686" comment="moodle-sv less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048687" comment="moodle-th less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048688" comment="moodle-tl less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048689" comment="moodle-tr less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048690" comment="moodle-uk less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048691" comment="moodle-vi less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048692" comment="moodle-zh_cn less than 1.7.2-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048693" comment="moodle less than 1.7.2-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1515</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1515" source="CVE"/>
	<description>
	The SOAP interface in OTRS 2.1.x before 2.1.8 and 2.2.x before 2.2.6 allows remote attackers to "read and modify objects" via SOAP requests, related to "Missing security checks."
	</description>
 </metadata>
<!-- ae2035e52e50fd126241d163039bf35b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048694" comment="otrs less than 2.1.3-15.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1531</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1531" source="CVE"/>
	<description>
	The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost.
	</description>
 </metadata>
<!-- f91284cb6a42a0b1f5805f78e00213b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048701" comment="lighttpd-mod_cml less than 1.4.13-41.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048702" comment="lighttpd-mod_magnet less than 1.4.13-41.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048703" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048704" comment="lighttpd-mod_rrdtool less than 1.4.13-41.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048705" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048706" comment="lighttpd-mod_webdav less than 1.4.13-41.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048707" comment="lighttpd less than 1.4.13-41.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1561</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) 0.99.5 through 0.99.8 allow remote attackers to cause a denial of service (application crash) via a malformed packet to the (1) X.509sat or (2) Roofnet dissectors.  NOTE: Vector 2 might also lead to a hang.
	</description>
 </metadata>
<!-- 9bdc4d9b11c3e9ba26a0ba41ef6fe34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048708" comment="wireshark-devel less than 0.99.5-5.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048709" comment="wireshark less than 0.99.5-5.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1562</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562" source="CVE"/>
	<description>
	The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.
	</description>
 </metadata>
<!-- 9bdc4d9b11c3e9ba26a0ba41ef6fe34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048708" comment="wireshark-devel less than 0.99.5-5.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048709" comment="wireshark less than 0.99.5-5.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1563</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1563" source="CVE"/>
	<description>
	The "decode as" feature in packet-bssap.c in the SCCP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 9bdc4d9b11c3e9ba26a0ba41ef6fe34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048708" comment="wireshark-devel less than 0.99.5-5.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048709" comment="wireshark less than 0.99.5-5.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1567</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1567" source="CVE"/>
	<description>
	phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048382" comment="phpMyAdmin less than 2.9.1.1-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1612</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612" source="CVE"/>
	<description>
	The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error.  NOTE: this issue is due to an incorrect fix for CVE-2007-6239.
	</description>
 </metadata>
<!-- e090a7f9d4955679952e01a06f5f6c3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048727" comment="squid less than 2.6.STABLE6-0.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1615</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615" source="CVE"/>
	<description>
	Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1637</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1637" source="CVE"/>
	<description>
	PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
	</description>
 </metadata>
<!-- 91c6f5be6b51e62cd7a6b5b127b6492b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048760" comment="pdns-recursor less than 3.1.3-22.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1654</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654" source="CVE"/>
	<description>
	Interaction error between Adobe Flash and multiple Universal Plug and Play (UPnP) services allow remote attackers to perform Cross-Site Request Forgery (CSRF) style attacks by using the Flash navigateToURL function to send a SOAP message to a UPnP control point, as demonstrated by changing the primary DNS server.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1655</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1657</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657" source="CVE"/>
	<description>
	OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
	</description>
 </metadata>
<!-- 90f94006762e9327d42eb5e9236da67a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048638" comment="openssh-askpass less than 4.4p1-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048639" comment="openssh less than 4.4p1-29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1669</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669" source="CVE"/>
	<description>
	Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1673</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673" source="CVE"/>
	<description>
	The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1679</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1683</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1683" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-0887.  Reason: This candidate is a duplicate of CVE-2008-0887.  Notes: All CVE users should reference CVE-2008-0887 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 13dcb639d43a276e7b46b2db84219a4c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048807" comment="xscreensaver less than 5.01-18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
	<description>
	Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ecdeebb3533538d5f55b11e3898c4e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048820" comment="vorbis-tools less than 1.1.1-39"/>
	</criteria>
	<!-- ae15639a84132604f76d900c3cb5d114 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048824" comment="gstreamer010-plugins-good-doc less than 0.10.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048825" comment="gstreamer010-plugins-good-extra less than 0.10.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048826" comment="gstreamer010-plugins-good less than 0.10.4-10"/>
		</criteria>
	</criteria>
	<!-- b1eacb216fc1ea87bdd7d36a11a2cf77 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048833" comment="xine-devel less than 1.1.2-40.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048834" comment="xine-extra less than 1.1.2-40.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048835" comment="xine-lib-32bit less than 1.1.2-40.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048836" comment="xine-lib-64bit less than 1.1.2-40.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048837" comment="xine-lib less than 1.1.2-40.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048838" comment="xine-ui-32bit less than 0.99.4-84.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048839" comment="xine-ui-64bit less than 0.99.4-84.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048840" comment="xine-ui less than 0.99.4-84.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1693</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693" source="CVE"/>
	<description>
	The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 40c6a94b34b27d4ee8345edd3ff231ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048860" comment="gpdf less than 2.10.0-82.6"/>
	</criteria>
	<!-- a613bbd2feea00637e2980c57234bfca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048861" comment="cups-client less than 1.2.7-12.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048862" comment="cups-devel less than 1.2.7-12.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048863" comment="cups-libs-32bit less than 1.2.7-12.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048864" comment="cups-libs-64bit less than 1.2.7-12.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048865" comment="cups-libs less than 1.2.7-12.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048866" comment="cups less than 1.2.7-12.17"/>
		</criteria>
	</criteria>
	<!-- caccb63f25b1b4ca52ab1bc7d6362cf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048871" comment="poppler-devel less than 0.5.4-33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048872" comment="poppler-glib less than 0.5.4-33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048873" comment="poppler-qt less than 0.5.4-33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048874" comment="poppler-tools less than 0.5.4-33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048875" comment="poppler less than 0.5.4-33.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1722</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722" source="CVE"/>
	<description>
	Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.
	</description>
 </metadata>
<!-- a613bbd2feea00637e2980c57234bfca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048861" comment="cups-client less than 1.2.7-12.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048862" comment="cups-devel less than 1.2.7-12.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048863" comment="cups-libs-32bit less than 1.2.7-12.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048864" comment="cups-libs-64bit less than 1.2.7-12.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048865" comment="cups-libs less than 1.2.7-12.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048866" comment="cups less than 1.2.7-12.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1761</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761" source="CVE"/>
	<description>
	Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted newsfeed source, which triggers an invalid memory access.
	</description>
 </metadata>
<!-- 9e934fe8f90d458740da270ed3dbc56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035343" comment="opera less than 9.27-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1762</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762" source="CVE"/>
	<description>
	Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted scaled image pattern in an HTML CANVAS element, which triggers memory corruption.
	</description>
 </metadata>
<!-- 9e934fe8f90d458740da270ed3dbc56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035343" comment="opera less than 9.27-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1767</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767" source="CVE"/>
	<description>
	Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
	</description>
 </metadata>
<!-- 4217664d46f2b4c739c4fb5f6450b2da -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048876" comment="libxslt-32bit less than 1.1.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048877" comment="libxslt-64bit less than 1.1.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048878" comment="libxslt-devel-32bit less than 1.1.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048879" comment="libxslt-devel-64bit less than 1.1.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048880" comment="libxslt-devel less than 1.1.17-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048881" comment="libxslt less than 1.1.17-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1801</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801" source="CVE"/>
	<description>
	Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
	</description>
 </metadata>
<!-- b4ffc88003e3df67328113a1d3132ba5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048890" comment="rdesktop less than 1.5.0-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1802</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802" source="CVE"/>
	<description>
	Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
	</description>
 </metadata>
<!-- b4ffc88003e3df67328113a1d3132ba5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048890" comment="rdesktop less than 1.5.0-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1803</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803" source="CVE"/>
	<description>
	Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow.  NOTE: the role of the channel_process function was not specified by the original researcher.
	</description>
 </metadata>
<!-- b4ffc88003e3df67328113a1d3132ba5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048890" comment="rdesktop less than 1.5.0-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1806</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806" source="CVE"/>
	<description>
	Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 4864dc5c6464cc9fbcb74c6d0e0a933a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048891" comment="freetype2-32bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048892" comment="freetype2-64bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048893" comment="freetype2-devel-32bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048894" comment="freetype2-devel-64bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048895" comment="freetype2-devel less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048896" comment="freetype2 less than 2.3.5-4.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1807</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807" source="CVE"/>
	<description>
	FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.
	</description>
 </metadata>
<!-- 4864dc5c6464cc9fbcb74c6d0e0a933a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048891" comment="freetype2-32bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048892" comment="freetype2-64bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048893" comment="freetype2-devel-32bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048894" comment="freetype2-devel-64bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048895" comment="freetype2-devel less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048896" comment="freetype2 less than 2.3.5-4.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1808</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808" source="CVE"/>
	<description>
	Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 4864dc5c6464cc9fbcb74c6d0e0a933a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048891" comment="freetype2-32bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048892" comment="freetype2-64bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048893" comment="freetype2-devel-32bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048894" comment="freetype2-devel-64bit less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048895" comment="freetype2-devel less than 2.3.5-4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048896" comment="freetype2 less than 2.3.5-4.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1833</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833" source="CVE"/>
	<description>
	Heap-based buffer overflow in pe.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted WWPack compressed PE binary.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1835</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835" source="CVE"/>
	<description>
	ClamAV before 0.93 allows remote attackers to bypass the scanning enging via a RAR file with an invalid version number, which cannot be parsed by ClamAV but can be extracted by Winrar.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1836</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836" source="CVE"/>
	<description>
	The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1837</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837" source="CVE"/>
	<description>
	libclamunrar in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via crafted RAR files that trigger "memory problems," as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1878</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878" source="CVE"/>
	<description>
	Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
	</description>
 </metadata>
<!-- b1eacb216fc1ea87bdd7d36a11a2cf77 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048833" comment="xine-devel less than 1.1.2-40.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048834" comment="xine-extra less than 1.1.2-40.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048835" comment="xine-lib-32bit less than 1.1.2-40.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048836" comment="xine-lib-64bit less than 1.1.2-40.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048837" comment="xine-lib less than 1.1.2-40.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048838" comment="xine-ui-32bit less than 0.99.4-84.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048839" comment="xine-ui-64bit less than 0.99.4-84.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048840" comment="xine-ui less than 0.99.4-84.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1887</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887" source="CVE"/>
	<description>
	Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1891</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1891" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1897</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897" source="CVE"/>
	<description>
	The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before C.1.8.1; AsteriskNOW before 1.0.3; Appliance Developer Kit 0.x.x; and s800i before 1.1.0.3, when configured to allow unauthenticated calls, does not verify that an ACK response contains a call number matching the server's reply to a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed ACK response that does not complete a 3-way handshake.  NOTE: this issue exists because of an incomplete fix for CVE-2008-1923.
	</description>
 </metadata>
<!-- 06dce6c7b8b23a5387c98f5f8e05bd99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048918" comment="asterisk-alsa less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048919" comment="asterisk-odbc less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048920" comment="asterisk-pgsql less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048921" comment="asterisk-spandsp less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048922" comment="asterisk-zaptel less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048923" comment="asterisk less than 1.2.13-31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1922</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vectors, probably a crafted Squid log file.
	</description>
 </metadata>
<!-- 176c1a376734fbb5b35ee3898f0538c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048925" comment="sarg less than 2.2.2-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1924</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924" source="CVE"/>
	<description>
	Unspecified vulnerability in phpMyAdmin before 2.11.5.2, when running on shared hosts, allows remote authenticated users with CREATE table permissions to read arbitrary files via a crafted HTTP POST request, related to use of an undefined UploadDir variable.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048382" comment="phpMyAdmin less than 2.9.1.1-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1927</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927" source="CVE"/>
	<description>
	Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.  NOTE: this issue might only be present on certain operating systems.
	</description>
 </metadata>
<!-- bac707c25cbb462255a9c49e1d11ffeb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048935" comment="perl-32bit less than 5.8.8-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048936" comment="perl-64bit less than 5.8.8-36"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048937" comment="perl less than 5.8.8-36"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1948</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948" source="CVE"/>
	<description>
	The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
	</description>
 </metadata>
<!-- b5f41eb3ee195f78c46b95dfa96fd450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048960" comment="gnutls-32bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048961" comment="gnutls-64bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048962" comment="gnutls-devel-32bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048963" comment="gnutls-devel-64bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048964" comment="gnutls-devel less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048965" comment="gnutls less than 1.4.4-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1949</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949" source="CVE"/>
	<description>
	The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.
	</description>
 </metadata>
<!-- b5f41eb3ee195f78c46b95dfa96fd450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048960" comment="gnutls-32bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048961" comment="gnutls-64bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048962" comment="gnutls-devel-32bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048963" comment="gnutls-devel-64bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048964" comment="gnutls-devel less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048965" comment="gnutls less than 1.4.4-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1950</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950" source="CVE"/>
	<description>
	Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
	</description>
 </metadata>
<!-- b5f41eb3ee195f78c46b95dfa96fd450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048960" comment="gnutls-32bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048961" comment="gnutls-64bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048962" comment="gnutls-devel-32bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048963" comment="gnutls-devel-64bit less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048964" comment="gnutls-devel less than 1.4.4-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048965" comment="gnutls less than 1.4.4-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1996</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1996" source="CVE"/>
	<description>
	licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections.
	</description>
 </metadata>
<!-- 74a6a4e144f72c189092afab9ac69dc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048966" comment="licq-icqnd less than 1.3.4-29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048967" comment="licq less than 1.3.4-29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2004</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2004" source="CVE"/>
	<description>
	The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.
	</description>
 </metadata>
<!-- ee6e543fa7beaea81e6e0aecd278d7c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048969" comment="qemu less than 0.8.2-34.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2050</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050" source="CVE"/>
	<description>
	Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048513" comment="apache2-mod_php5 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048514" comment="php5-bcmath less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048515" comment="php5-bz2 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048516" comment="php5-calendar less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048517" comment="php5-ctype less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048518" comment="php5-curl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048519" comment="php5-dba less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048520" comment="php5-dbase less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048521" comment="php5-devel less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048522" comment="php5-dom less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048523" comment="php5-exif less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048524" comment="php5-fastcgi less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048525" comment="php5-ftp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048526" comment="php5-gd less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048527" comment="php5-gettext less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048528" comment="php5-gmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048529" comment="php5-hash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048530" comment="php5-iconv less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048531" comment="php5-imap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048532" comment="php5-json less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048533" comment="php5-ldap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048534" comment="php5-mbstring less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048535" comment="php5-mcrypt less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048536" comment="php5-mhash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048537" comment="php5-mysql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048538" comment="php5-ncurses less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048539" comment="php5-odbc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048540" comment="php5-openssl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048541" comment="php5-pcntl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048542" comment="php5-pdo less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048543" comment="php5-pear less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048544" comment="php5-pgsql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048545" comment="php5-posix less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048546" comment="php5-pspell less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048547" comment="php5-readline less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048548" comment="php5-shmop less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048549" comment="php5-snmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048550" comment="php5-soap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048551" comment="php5-sockets less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048552" comment="php5-sqlite less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048553" comment="php5-suhosin less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048554" comment="php5-sysvmsg less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048555" comment="php5-sysvsem less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048556" comment="php5-sysvshm less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048557" comment="php5-tidy less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048558" comment="php5-tokenizer less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048559" comment="php5-wddx less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048560" comment="php5-xmlreader less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048561" comment="php5-xmlrpc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048562" comment="php5-xmlwriter less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048563" comment="php5-xsl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048564" comment="php5-zip less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048565" comment="php5-zlib less than 5.2.6-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2051</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051" source="CVE"/>
	<description>
	The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars."
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048513" comment="apache2-mod_php5 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048514" comment="php5-bcmath less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048515" comment="php5-bz2 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048516" comment="php5-calendar less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048517" comment="php5-ctype less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048518" comment="php5-curl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048519" comment="php5-dba less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048520" comment="php5-dbase less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048521" comment="php5-devel less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048522" comment="php5-dom less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048523" comment="php5-exif less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048524" comment="php5-fastcgi less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048525" comment="php5-ftp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048526" comment="php5-gd less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048527" comment="php5-gettext less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048528" comment="php5-gmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048529" comment="php5-hash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048530" comment="php5-iconv less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048531" comment="php5-imap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048532" comment="php5-json less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048533" comment="php5-ldap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048534" comment="php5-mbstring less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048535" comment="php5-mcrypt less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048536" comment="php5-mhash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048537" comment="php5-mysql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048538" comment="php5-ncurses less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048539" comment="php5-odbc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048540" comment="php5-openssl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048541" comment="php5-pcntl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048542" comment="php5-pdo less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048543" comment="php5-pear less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048544" comment="php5-pgsql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048545" comment="php5-posix less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048546" comment="php5-pspell less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048547" comment="php5-readline less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048548" comment="php5-shmop less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048549" comment="php5-snmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048550" comment="php5-soap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048551" comment="php5-sockets less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048552" comment="php5-sqlite less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048553" comment="php5-suhosin less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048554" comment="php5-sysvmsg less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048555" comment="php5-sysvsem less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048556" comment="php5-sysvshm less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048557" comment="php5-tidy less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048558" comment="php5-tokenizer less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048559" comment="php5-wddx less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048560" comment="php5-xmlreader less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048561" comment="php5-xmlrpc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048562" comment="php5-xmlwriter less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048563" comment="php5-xsl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048564" comment="php5-zip less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048565" comment="php5-zlib less than 5.2.6-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
	<description>
	MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
	</description>
 </metadata>
<!-- c4b7968ba8262091c58a73fdf922c22a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043029" comment="mysql-Max less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043030" comment="mysql-bench less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043031" comment="mysql-client less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043032" comment="mysql-debug less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043033" comment="mysql-devel less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043034" comment="mysql-shared-32bit less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043035" comment="mysql-shared-64bit less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043036" comment="mysql-shared less than 5.0.26-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043037" comment="mysql less than 5.0.26-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2107</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2107" source="CVE"/>
	<description>
	The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048513" comment="apache2-mod_php5 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048514" comment="php5-bcmath less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048515" comment="php5-bz2 less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048516" comment="php5-calendar less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048517" comment="php5-ctype less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048518" comment="php5-curl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048519" comment="php5-dba less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048520" comment="php5-dbase less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048521" comment="php5-devel less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048522" comment="php5-dom less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048523" comment="php5-exif less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048524" comment="php5-fastcgi less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048525" comment="php5-ftp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048526" comment="php5-gd less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048527" comment="php5-gettext less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048528" comment="php5-gmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048529" comment="php5-hash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048530" comment="php5-iconv less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048531" comment="php5-imap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048532" comment="php5-json less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048533" comment="php5-ldap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048534" comment="php5-mbstring less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048535" comment="php5-mcrypt less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048536" comment="php5-mhash less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048537" comment="php5-mysql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048538" comment="php5-ncurses less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048539" comment="php5-odbc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048540" comment="php5-openssl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048541" comment="php5-pcntl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048542" comment="php5-pdo less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048543" comment="php5-pear less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048544" comment="php5-pgsql less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048545" comment="php5-posix less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048546" comment="php5-pspell less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048547" comment="php5-readline less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048548" comment="php5-shmop less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048549" comment="php5-snmp less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048550" comment="php5-soap less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048551" comment="php5-sockets less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048552" comment="php5-sqlite less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048553" comment="php5-suhosin less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048554" comment="php5-sysvmsg less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048555" comment="php5-sysvsem less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048556" comment="php5-sysvshm less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048557" comment="php5-tidy less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048558" comment="php5-tokenizer less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048559" comment="php5-wddx less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048560" comment="php5-xmlreader less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048561" comment="php5-xmlrpc less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048562" comment="php5-xmlwriter less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048563" comment="php5-xsl less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048564" comment="php5-zip less than 5.2.6-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048565" comment="php5-zlib less than 5.2.6-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2119</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119" source="CVE"/>
	<description>
	Asterisk Open Source 1.0.x and 1.2.x before 1.2.29 and Business Edition A.x.x and B.x.x before B.2.5.3, when pedantic parsing (aka pedanticsipchecking) is enabled, allows remote attackers to cause a denial of service (daemon crash) via a SIP INVITE message that lacks a From header, related to invocations of the ast_uri_decode function, and improper handling of (1) an empty const string and (2) a NULL pointer.
	</description>
 </metadata>
<!-- 06dce6c7b8b23a5387c98f5f8e05bd99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048918" comment="asterisk-alsa less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048919" comment="asterisk-odbc less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048920" comment="asterisk-pgsql less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048921" comment="asterisk-spandsp less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048922" comment="asterisk-zaptel less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048923" comment="asterisk less than 1.2.13-31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2136</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136" source="CVE"/>
	<description>
	Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2142</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142" source="CVE"/>
	<description>
	Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09d55d12562d4cc2fd6f33254990a8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049038" comment="xemacs-packages-el less than 20060510-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049039" comment="xemacs-packages-info less than 20060510-30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049040" comment="xemacs-packages less than 20060510-30"/>
		</criteria>
	</criteria>
	<!-- e9782167cb83afbb8920e336d928e23f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049044" comment="emacs-el less than 21.3-257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049045" comment="emacs-info less than 21.3-257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049046" comment="emacs-nox less than 21.3-257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049047" comment="emacs-x11 less than 21.3-257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049048" comment="emacs less than 21.3-257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2235</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235" source="CVE"/>
	<description>
	OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bc585ff1ceb92bdb83ac53c4c29d5210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049065" comment="opensc-devel less than 0.11.1-20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049066" comment="opensc less than 0.11.1-20"/>
		</criteria>
	</criteria>
	<!-- c600d2f5bbb047710b6e84397c4fe84e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049074" comment="opensc-devel less than 0.11.1-22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049075" comment="opensc less than 0.11.1-22"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2237</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.
	</description>
 </metadata>
<!-- 32c0adf7d03e6d4364b600f088248fd1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049083" comment="OpenOffice_org-af less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049084" comment="OpenOffice_org-ar less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049085" comment="OpenOffice_org-be-BY less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049086" comment="OpenOffice_org-bg less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049087" comment="OpenOffice_org-ca less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049088" comment="OpenOffice_org-cs less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049089" comment="OpenOffice_org-cy less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049090" comment="OpenOffice_org-da less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049091" comment="OpenOffice_org-de less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049092" comment="OpenOffice_org-el less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049093" comment="OpenOffice_org-en-GB less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049094" comment="OpenOffice_org-es less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049095" comment="OpenOffice_org-et less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049096" comment="OpenOffice_org-fi less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049097" comment="OpenOffice_org-fr less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049098" comment="OpenOffice_org-galleries less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049099" comment="OpenOffice_org-gnome less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049100" comment="OpenOffice_org-gu-IN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049101" comment="OpenOffice_org-hi-IN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049102" comment="OpenOffice_org-hr less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049103" comment="OpenOffice_org-hu less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049104" comment="OpenOffice_org-it less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049105" comment="OpenOffice_org-ja less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049106" comment="OpenOffice_org-kde less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049107" comment="OpenOffice_org-km less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049108" comment="OpenOffice_org-ko less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049109" comment="OpenOffice_org-lt less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049110" comment="OpenOffice_org-mk less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049111" comment="OpenOffice_org-mono less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049112" comment="OpenOffice_org-nb less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049113" comment="OpenOffice_org-nl less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049114" comment="OpenOffice_org-nn less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049115" comment="OpenOffice_org-officebean less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049116" comment="OpenOffice_org-pa-IN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049117" comment="OpenOffice_org-pl less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049118" comment="OpenOffice_org-pt-BR less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049119" comment="OpenOffice_org-pt less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049120" comment="OpenOffice_org-ru less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049121" comment="OpenOffice_org-rw less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049122" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049123" comment="OpenOffice_org-sdk less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049124" comment="OpenOffice_org-sk less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049125" comment="OpenOffice_org-sl less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049126" comment="OpenOffice_org-sr-CS less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049127" comment="OpenOffice_org-st less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049128" comment="OpenOffice_org-sv less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049129" comment="OpenOffice_org-tr less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049130" comment="OpenOffice_org-ts less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049131" comment="OpenOffice_org-vi less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049132" comment="OpenOffice_org-xh less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049133" comment="OpenOffice_org-zh-CN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049134" comment="OpenOffice_org-zh-TW less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049135" comment="OpenOffice_org-zu less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049136" comment="OpenOffice_org less than 2.0.4-38.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2238</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238" source="CVE"/>
	<description>
	Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 32c0adf7d03e6d4364b600f088248fd1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049083" comment="OpenOffice_org-af less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049084" comment="OpenOffice_org-ar less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049085" comment="OpenOffice_org-be-BY less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049086" comment="OpenOffice_org-bg less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049087" comment="OpenOffice_org-ca less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049088" comment="OpenOffice_org-cs less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049089" comment="OpenOffice_org-cy less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049090" comment="OpenOffice_org-da less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049091" comment="OpenOffice_org-de less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049092" comment="OpenOffice_org-el less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049093" comment="OpenOffice_org-en-GB less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049094" comment="OpenOffice_org-es less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049095" comment="OpenOffice_org-et less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049096" comment="OpenOffice_org-fi less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049097" comment="OpenOffice_org-fr less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049098" comment="OpenOffice_org-galleries less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049099" comment="OpenOffice_org-gnome less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049100" comment="OpenOffice_org-gu-IN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049101" comment="OpenOffice_org-hi-IN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049102" comment="OpenOffice_org-hr less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049103" comment="OpenOffice_org-hu less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049104" comment="OpenOffice_org-it less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049105" comment="OpenOffice_org-ja less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049106" comment="OpenOffice_org-kde less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049107" comment="OpenOffice_org-km less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049108" comment="OpenOffice_org-ko less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049109" comment="OpenOffice_org-lt less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049110" comment="OpenOffice_org-mk less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049111" comment="OpenOffice_org-mono less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049112" comment="OpenOffice_org-nb less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049113" comment="OpenOffice_org-nl less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049114" comment="OpenOffice_org-nn less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049115" comment="OpenOffice_org-officebean less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049116" comment="OpenOffice_org-pa-IN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049117" comment="OpenOffice_org-pl less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049118" comment="OpenOffice_org-pt-BR less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049119" comment="OpenOffice_org-pt less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049120" comment="OpenOffice_org-ru less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049121" comment="OpenOffice_org-rw less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049122" comment="OpenOffice_org-sdk-doc less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049123" comment="OpenOffice_org-sdk less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049124" comment="OpenOffice_org-sk less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049125" comment="OpenOffice_org-sl less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049126" comment="OpenOffice_org-sr-CS less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049127" comment="OpenOffice_org-st less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049128" comment="OpenOffice_org-sv less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049129" comment="OpenOffice_org-tr less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049130" comment="OpenOffice_org-ts less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049131" comment="OpenOffice_org-vi less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049132" comment="OpenOffice_org-xh less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049133" comment="OpenOffice_org-zh-CN less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049134" comment="OpenOffice_org-zh-TW less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049135" comment="OpenOffice_org-zu less than 2.0.4-38.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049136" comment="OpenOffice_org less than 2.0.4-38.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2292</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292" source="CVE"/>
	<description>
	Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
	</description>
 </metadata>
<!-- 5c5533dfe70147c9aaa62dc81727e486 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048156" comment="net-snmp-32bit less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048157" comment="net-snmp-64bit less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048158" comment="net-snmp-devel-64bit less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048159" comment="net-snmp-devel less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048160" comment="net-snmp less than 5.4.rc2-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048161" comment="perl-SNMP less than 5.4.rc2-8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2316</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316" source="CVE"/>
	<description>
	Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2327</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327" source="CVE"/>
	<description>
	Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
	</description>
 </metadata>
<!-- 305e62b046e5a6cb3066d3b78eae5989 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049235" comment="libtiff-32bit less than 3.8.2-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049236" comment="libtiff-64bit less than 3.8.2-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049237" comment="libtiff-devel-32bit less than 3.8.2-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049238" comment="libtiff-devel-64bit less than 3.8.2-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049239" comment="libtiff-devel less than 3.8.2-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049240" comment="libtiff less than 3.8.2-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2357</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357" source="CVE"/>
	<description>
	Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record.  NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.
	</description>
 </metadata>
<!-- d3ea2fd56121612d9aca367275808b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049258" comment="mtr-gtk less than 0.72-20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049259" comment="mtr less than 0.72-20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2358</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2358" source="CVE"/>
	<description>
	Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 37010a8b0893e21402a5703dcb08e7e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047072" comment="kernel-bigsmp less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047073" comment="kernel-default less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047074" comment="kernel-iseries64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047075" comment="kernel-kdump less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047076" comment="kernel-ppc64 less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047077" comment="kernel-source less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047078" comment="kernel-syms less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047079" comment="kernel-xen less than 2.6.18.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047080" comment="kernel-xenpae less than 2.6.18.8-0.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2360</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360" source="CVE"/>
	<description>
	Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 168a4e311a76021ddb0b65273348544a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045873" comment="xorg-x11-server-sdk less than 7.2-30.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045874" comment="xorg-x11-server less than 7.2-30.15"/>
		</criteria>
	</criteria>
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048483" comment="xgl less than cvs_060522-45"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2361</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 168a4e311a76021ddb0b65273348544a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045873" comment="xorg-x11-server-sdk less than 7.2-30.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045874" comment="xorg-x11-server less than 7.2-30.15"/>
		</criteria>
	</criteria>
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048483" comment="xgl less than cvs_060522-45"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2362</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362" source="CVE"/>
	<description>
	Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 168a4e311a76021ddb0b65273348544a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009045873" comment="xorg-x11-server-sdk less than 7.2-30.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009045874" comment="xorg-x11-server less than 7.2-30.15"/>
		</criteria>
	</criteria>
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048483" comment="xgl less than cvs_060522-45"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2370</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
	</description>
 </metadata>
<!-- 20925bda7ad6cf2fae40c70629a57241 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048413" comment="tomcat5-admin-webapps less than 5.0.30-65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048414" comment="tomcat5-webapps less than 5.0.30-65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048415" comment="tomcat5 less than 5.0.30-65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2374</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374" source="CVE"/>
	<description>
	src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
	</description>
 </metadata>
<!-- 6dc784ab0d16da7d3d1e152e4331e82a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049286" comment="bluez-cups less than 3.7-29.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049287" comment="bluez-libs less than 3.7-14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049288" comment="bluez-test less than 3.7-29.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049289" comment="bluez-utils less than 3.7-29.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2379</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2379" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.
	</description>
 </metadata>
<!-- 9a389ec82a94cf2bf4cc62ac48116812 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049300" comment="squirrelmail less than 1.4.10a-61.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2388</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2388" source="CVE"/>
	<description>
	Multiple off-by-one errors in opensuse-updater in openSUSE 10.2 have unspecified impact and attack vectors.  NOTE: the vendor states that these "can be considered no security problem."
	</description>
 </metadata>
<!-- 270a284807225c46f341694df186fbcb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049325" comment="opensuse-updater less than 0.5-0.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2389</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2389" source="CVE"/>
	<description>
	opensuse-updater in openSUSE 10.2 allows local users to access arbitrary files via a symlink attack.
	</description>
 </metadata>
<!-- 270a284807225c46f341694df186fbcb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049325" comment="opensuse-updater less than 0.5-0.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2426</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.
	</description>
 </metadata>
<!-- bcdc9d540e9f21e297939e86656e5f92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049329" comment="imlib2-devel less than 1.2.1-46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049330" comment="imlib2-filters less than 1.2.1-46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049331" comment="imlib2-loaders less than 1.2.1-46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049332" comment="imlib2 less than 1.2.1-46"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2549</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2549" source="CVE"/>
	<description>
	Adobe Acrobat Reader 8.1.2 and earlier, and before 7.1.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed PDF document, as demonstrated by 2008-HI2.pdf.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2641</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method."
	</description>
 </metadata>
<!-- fc394fbd892e7ea66e7ae5ab3fa96958 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035532" comment="acroread less than 8.1.2_SU1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2662</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2663</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2664</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664" source="CVE"/>
	<description>
	The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2667</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2667" source="CVE"/>
	<description>
	SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
	</description>
 </metadata>
<!-- 196f8e1910eb925736af21c11e102d7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049338" comment="courier-authlib-devel less than 0.58-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049339" comment="courier-authlib-ldap less than 0.58-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049340" comment="courier-authlib-mysql less than 0.58-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049341" comment="courier-authlib-pgsql less than 0.58-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049342" comment="courier-authlib-pipe less than 0.58-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049343" comment="courier-authlib-userdb less than 0.58-38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049344" comment="courier-authlib less than 0.58-38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2696</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2696" source="CVE"/>
	<description>
	Exiv2 0.16 allows user-assisted remote attackers to cause a denial of service (divide-by-zero and application crash) via a zero value in Nikon lens information in the metadata of an image, related to "pretty printing" and the RationalValue::toLong function.
	</description>
 </metadata>
<!-- 7c05331922f17fa43108a675e0a1239c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049352" comment="libexiv2-devel less than 0.11-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049353" comment="libexiv2 less than 0.11-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2713</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713" source="CVE"/>
	<description>
	libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5983180f90658c6cd1b47d490db4b831 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035546" comment="clamav-db less than 0.93.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033814" comment="clamav less than 0.93.3-0.1"/>
		</criteria>
	</criteria>
	<!-- 7547892da5d37d7eb5534a402f4a9f77 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035547" comment="clamav-db less than 0.93.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033813" comment="clamav less than 0.93.1-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2714</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2714" source="CVE"/>
	<description>
	Opera before 9.26 allows remote attackers to misrepresent web page addresses using "certain characters" that "cause the page address text to be misplaced."
	</description>
 </metadata>
<!-- 07c5022cd9963bda975dcc2222992a28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035548" comment="opera less than 9.50-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2715</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2715" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.5 allows remote attackers to read cross-domain images via HTML CANVAS elements that use the images as patterns.
	</description>
 </metadata>
<!-- 07c5022cd9963bda975dcc2222992a28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035548" comment="opera less than 9.50-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2716</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2716" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.5 allows remote attackers to spoof the contents of trusted frames on the same parent page by modifying the location, which can facilitate phishing attacks.
	</description>
 </metadata>
<!-- 07c5022cd9963bda975dcc2222992a28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035548" comment="opera less than 9.50-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2725</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2726</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2727</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2727" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2725.  Reason: This candidate is a duplicate of CVE-2008-2725.  Notes: All CVE users should reference CVE-2008-2725 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2728</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2728" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2726.  Reason: This candidate is a duplicate of CVE-2008-2726.  Notes: All CVE users should reference CVE-2008-2726 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048368" comment="ruby-devel less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048369" comment="ruby-doc-html less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048370" comment="ruby-doc-ri less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048371" comment="ruby-examples less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048372" comment="ruby-test-suite less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048373" comment="ruby-tk less than 1.8.5-25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048374" comment="ruby less than 1.8.5-25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2785</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a9fbe7e71158bafe0f7569b24d2f568 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035551" comment="MozillaFirefox-translations less than 2.0.0.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035552" comment="MozillaFirefox less than 2.0.0.16-0.1"/>
		</criteria>
	</criteria>
	<!-- 6ac3c1848576dd57fe6feaaa0e1e15c2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049376" comment="MozillaThunderbird-translations less than 1.5.0.14-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049377" comment="MozillaThunderbird less than 1.5.0.14-0.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2798</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2799</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2800</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2801</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2802</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2803</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803" source="CVE"/>
	<description>
	The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2805</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2806</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2806" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 on Mac OS X allow remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2807</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2808</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2809</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809" source="CVE"/>
	<description>
	Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2810</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2811</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811" source="CVE"/>
	<description>
	The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.
	</description>
 </metadata>
<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2812</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812" source="CVE"/>
	<description>
	The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2829</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829" source="CVE"/>
	<description>
	php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.
	</description>
 </metadata>
<!-- 4a539502f8a7c8f5be6334b98e82d558 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049406" comment="apache2-mod_php5 less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049407" comment="php5-bcmath less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049408" comment="php5-bz2 less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049409" comment="php5-calendar less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049410" comment="php5-ctype less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049411" comment="php5-curl less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049412" comment="php5-dba less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049413" comment="php5-dbase less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049414" comment="php5-devel less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049415" comment="php5-dom less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049416" comment="php5-exif less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049417" comment="php5-fastcgi less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049418" comment="php5-ftp less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049419" comment="php5-gd less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049420" comment="php5-gettext less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049421" comment="php5-gmp less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049422" comment="php5-hash less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049423" comment="php5-iconv less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049424" comment="php5-imap less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049425" comment="php5-json less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049426" comment="php5-ldap less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049427" comment="php5-mbstring less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049428" comment="php5-mcrypt less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049429" comment="php5-mhash less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049430" comment="php5-mysql less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049431" comment="php5-ncurses less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049432" comment="php5-odbc less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049433" comment="php5-openssl less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049434" comment="php5-pcntl less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049435" comment="php5-pdo less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049436" comment="php5-pear less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049437" comment="php5-pgsql less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049438" comment="php5-posix less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049439" comment="php5-pspell less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049440" comment="php5-readline less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049441" comment="php5-shmop less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049442" comment="php5-snmp less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049443" comment="php5-soap less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049444" comment="php5-sockets less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049445" comment="php5-sqlite less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049446" comment="php5-suhosin less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049447" comment="php5-sysvmsg less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049448" comment="php5-sysvsem less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049449" comment="php5-sysvshm less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049450" comment="php5-tidy less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049451" comment="php5-tokenizer less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049452" comment="php5-wddx less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049453" comment="php5-xmlreader less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049454" comment="php5-xmlrpc less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049455" comment="php5-xmlwriter less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049456" comment="php5-xsl less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049457" comment="php5-zip less than 5.2.6-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049458" comment="php5-zlib less than 5.2.6-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2927</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.
	</description>
 </metadata>
<!-- e970ff0c5f6d7de819f8f2bfc65a823a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049465" comment="gaim-devel less than 1.5.0-88"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049466" comment="gaim less than 1.5.0-88"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2931</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2931" source="CVE"/>
	<description>
	The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2933</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.16, and 3.x before 3.0.1, interprets '|' (pipe) characters in a command-line URI as requests to open multiple tabs, which allows remote attackers to access chrome:i URIs, or read arbitrary local files via manipulations involving a series of URIs that is not entirely handled by a vector application, as exploited in conjunction with CVE-2008-2540.  NOTE: this issue exists because of an insufficient fix for CVE-2005-2267.
	</description>
 </metadata>
<!-- 6a9fbe7e71158bafe0f7569b24d2f568 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035551" comment="MozillaFirefox-translations less than 2.0.0.16-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035552" comment="MozillaFirefox less than 2.0.0.16-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2935</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."
	</description>
 </metadata>
<!-- f321531b834ba0b2d81c4bcefc93ea78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049482" comment="libxslt-32bit less than 1.1.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049483" comment="libxslt-64bit less than 1.1.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049484" comment="libxslt-devel-32bit less than 1.1.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049485" comment="libxslt-devel-64bit less than 1.1.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049486" comment="libxslt-devel less than 1.1.17-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049487" comment="libxslt less than 1.1.17-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2936</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936" source="CVE"/>
	<description>
	Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message.  NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
	</description>
 </metadata>
<!-- dc6c4ede98a83e45868508bd87a1f74d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049494" comment="postfix-devel less than 2.3.2-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049495" comment="postfix-mysql less than 2.3.2-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049496" comment="postfix-postgresql less than 2.3.2-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049497" comment="postfix less than 2.3.2-32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2937</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937" source="CVE"/>
	<description>
	Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
	</description>
 </metadata>
<!-- dc6c4ede98a83e45868508bd87a1f74d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049494" comment="postfix-devel less than 2.3.2-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049495" comment="postfix-mysql less than 2.3.2-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049496" comment="postfix-postgresql less than 2.3.2-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049497" comment="postfix less than 2.3.2-32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
	</description>
 </metadata>
<!-- 20925bda7ad6cf2fae40c70629a57241 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048413" comment="tomcat5-admin-webapps less than 5.0.30-65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048414" comment="tomcat5-webapps less than 5.0.30-65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048415" comment="tomcat5 less than 5.0.30-65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2939</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
	</description>
 </metadata>
<!-- 8313737b969316e2d93a1a8d180ff862 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047482" comment="apache2-devel less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047483" comment="apache2-doc less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047484" comment="apache2-example-pages less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047485" comment="apache2-prefork less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047486" comment="apache2-worker less than 2.2.3-26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047487" comment="apache2 less than 2.2.3-26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2940</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940" source="CVE"/>
	<description>
	The alert-mailing implementation in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to gain privileges and send e-mail messages from the root account via vectors related to the setalerts message, and lack of validation of the device URI associated with an event message.
	</description>
 </metadata>
<!-- 379fb01a5ff2a8fe58652bf3590e3a88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049505" comment="hplip-hpijs less than 1.6.10-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049506" comment="hplip less than 1.6.10-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2941</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941" source="CVE"/>
	<description>
	The hpssd message parser in hpssd.py in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to cause a denial of service (process stop) via a crafted packet, as demonstrated by sending "msg=0" to TCP port 2207.
	</description>
 </metadata>
<!-- 379fb01a5ff2a8fe58652bf3590e3a88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049505" comment="hplip-hpijs less than 1.6.10-27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049506" comment="hplip less than 1.6.10-27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2952</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952" source="CVE"/>
	<description>
	liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
	</description>
 </metadata>
<!-- 7d3149685991447ffcd14b12a0ce97e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049522" comment="openldap2-back-meta less than 2.3.27-34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049523" comment="openldap2-back-perl less than 2.3.27-34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049524" comment="openldap2-client-32bit less than 2.3.27-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049525" comment="openldap2-client-64bit less than 2.3.27-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049526" comment="openldap2-client less than 2.3.27-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049527" comment="openldap2-devel-32bit less than 2.3.27-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049528" comment="openldap2-devel-64bit less than 2.3.27-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049529" comment="openldap2-devel less than 2.3.27-32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049530" comment="openldap2 less than 2.3.27-34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2992</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3078</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3078" source="CVE"/>
	<description>
	Opera before 9.51 does not properly manage memory within functions supporting the CANVAS element, which allows remote attackers to read uninitialized memory contents by using JavaScript to read a canvas image.
	</description>
 </metadata>
<!-- b67a888ed8bb4a6235e5e9f0b8d5903b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035644" comment="opera less than 9.51-7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3103</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to "perform unauthorized operations" via unspecified vectors.
	</description>
 </metadata>
<!-- 619e2632e70e459017e1f83140ed9d5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3104</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet's outbound connections by connecting to localhost services running on the machine that loaded the applet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3105</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3105" source="CVE"/>
	<description>
	Unspecified vulnerability in the JAX-WS client and service in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows remote attackers to access URLs or cause a denial of service via unknown vectors involving "processing of XML data" by a trusted application.
	</description>
 </metadata>
<!-- 619e2632e70e459017e1f83140ed9d5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3106</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.
	</description>
 </metadata>
<!-- 619e2632e70e459017e1f83140ed9d5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3107</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3108</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108" source="CVE"/>
	<description>
	Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3111</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3112</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112" source="CVE"/>
	<description>
	Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3113</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3114</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58a5376eb5f7531b55b5a234ae736a9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049579" comment="java-1_4_2-sun-alsa less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049580" comment="java-1_4_2-sun-demo less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049581" comment="java-1_4_2-sun-devel less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049582" comment="java-1_4_2-sun-jdbc less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049583" comment="java-1_4_2-sun-plugin less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049584" comment="java-1_4_2-sun-src less than 1.4.2_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049585" comment="java-1_4_2-sun less than 1.4.2_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3115</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3115" source="CVE"/>
	<description>
	Secure Static Versioning in Sun Java JDK and JRE 6 Update 6 and earlier, and 5.0 Update 6 through 15, does not properly prevent execution of applets on older JRE releases, which might allow remote attackers to exploit vulnerabilities in these older releases.
	</description>
 </metadata>
<!-- 619e2632e70e459017e1f83140ed9d5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3134</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3134" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.
	</description>
 </metadata>
<!-- b5bb7b0615d4f2adfb73a3788a1c6be6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049617" comment="GraphicsMagick-c++-devel less than 1.1.7-35.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049618" comment="GraphicsMagick-c++ less than 1.1.7-35.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049619" comment="GraphicsMagick-devel less than 1.1.7-35.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049620" comment="GraphicsMagick less than 1.1.7-35.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049621" comment="perl-GraphicsMagick less than 1.1.7-35.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3137</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137" source="CVE"/>
	<description>
	The GSM SMS dissector in Wireshark (formerly Ethereal) 0.99.2 through 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3138</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138" source="CVE"/>
	<description>
	The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 through 1.0.0 allow remote attackers to cause a denial of service (application stop) via unknown vectors.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3139</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139" source="CVE"/>
	<description>
	The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.  NOTE: this might be due to a use-after-free error.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3140</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140" source="CVE"/>
	<description>
	The syslog dissector in Wireshark (formerly Ethereal) 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors, possibly related to an "incomplete SS7 MSU syslog encapsulated packet."
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3141</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141" source="CVE"/>
	<description>
	Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3142</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142" source="CVE"/>
	<description>
	Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3143</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143" source="CVE"/>
	<description>
	Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3144</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144" source="CVE"/>
	<description>
	Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations.  NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048787" comment="python-32bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048788" comment="python-64bit less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048789" comment="python-curses less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048790" comment="python-demo less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048791" comment="python-devel less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048792" comment="python-gdbm less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048793" comment="python-idle less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048794" comment="python-tk less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048795" comment="python-xml less than 2.5-19.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048796" comment="python less than 2.5-19.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3145</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145" source="CVE"/>
	<description>
	The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3146</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146" source="CVE"/>
	<description>
	Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049631" comment="wireshark-devel less than 0.99.5-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049632" comment="wireshark less than 0.99.5-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3187</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3187" source="CVE"/>
	<description>
	zypp-refresh-patches in zypper in SUSE openSUSE 10.2, 10.3, and 11.0 does not ask the user before accepting repository keys, which allows remote repositories to cause a denial of service (package data corruption) via a spoofed key.
	</description>
 </metadata>
<!-- 5a3677363366d65dd4029e4651c9c090 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049635" comment="libzypp-devel less than 2.17.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049636" comment="libzypp less than 2.17.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049637" comment="zypper less than 0.6.15-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3263</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3263" source="CVE"/>
	<description>
	The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.
	</description>
 </metadata>
<!-- 06dce6c7b8b23a5387c98f5f8e05bd99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048918" comment="asterisk-alsa less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048919" comment="asterisk-odbc less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048920" comment="asterisk-pgsql less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048921" comment="asterisk-spandsp less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048922" comment="asterisk-zaptel less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048923" comment="asterisk less than 1.2.13-31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3264</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3264" source="CVE"/>
	<description>
	The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.
	</description>
 </metadata>
<!-- 06dce6c7b8b23a5387c98f5f8e05bd99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048918" comment="asterisk-alsa less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048919" comment="asterisk-odbc less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048920" comment="asterisk-pgsql less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048921" comment="asterisk-spandsp less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048922" comment="asterisk-zaptel less than 1.2.13-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048923" comment="asterisk less than 1.2.13-31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3271</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
	</description>
 </metadata>
<!-- fad3ceb661ecb4fec474cae89e6574cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049665" comment="tomcat5-admin-webapps less than 5.0.30-67"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049666" comment="tomcat5-webapps less than 5.0.30-67"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049667" comment="tomcat5 less than 5.0.30-67"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3272</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272" source="CVE"/>
	<description>
	The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3281</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281" source="CVE"/>
	<description>
	libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.
	</description>
 </metadata>
<!-- cb85bf797f7a59a3d3dd88dcfdc9e054 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049684" comment="libxml2-32bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049685" comment="libxml2-64bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049686" comment="libxml2-devel-32bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049687" comment="libxml2-devel-64bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049688" comment="libxml2-devel less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049689" comment="libxml2 less than 2.6.26-31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3325</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3325" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to modify profile settings and gain privileges as other users via a link or IMG tag to the user edit profile page.
	</description>
 </metadata>
<!-- a36a8d6512b329d951f7cdef959e8635 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049697" comment="moodle-af less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049698" comment="moodle-ar less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049699" comment="moodle-be less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049700" comment="moodle-bg less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049701" comment="moodle-bs less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049702" comment="moodle-ca less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049703" comment="moodle-cs less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049704" comment="moodle-da less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049705" comment="moodle-de less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049706" comment="moodle-el less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049707" comment="moodle-es less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049708" comment="moodle-et less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049709" comment="moodle-eu less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049710" comment="moodle-fa less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049711" comment="moodle-fi less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049712" comment="moodle-fr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049713" comment="moodle-ga less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049714" comment="moodle-gl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049715" comment="moodle-he less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049716" comment="moodle-hi less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049717" comment="moodle-hr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049718" comment="moodle-hu less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049719" comment="moodle-id less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049720" comment="moodle-is less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049721" comment="moodle-it less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049722" comment="moodle-ja less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049723" comment="moodle-ka less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049724" comment="moodle-km less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049725" comment="moodle-kn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049726" comment="moodle-ko less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049727" comment="moodle-lt less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049728" comment="moodle-lv less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049729" comment="moodle-mi_tn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049730" comment="moodle-ms less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049731" comment="moodle-nl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049732" comment="moodle-nn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049733" comment="moodle-no less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049734" comment="moodle-pl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049735" comment="moodle-pt less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049736" comment="moodle-ro less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049737" comment="moodle-ru less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049738" comment="moodle-sk less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049739" comment="moodle-sl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049740" comment="moodle-so less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049741" comment="moodle-sq less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049742" comment="moodle-sr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049743" comment="moodle-sv less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049744" comment="moodle-th less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049745" comment="moodle-tl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049746" comment="moodle-tr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049747" comment="moodle-uk less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049748" comment="moodle-vi less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049749" comment="moodle-zh_cn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049750" comment="moodle less than 1.7.2-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3326</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3326" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the etitle parameter (blog entry title).
	</description>
 </metadata>
<!-- a36a8d6512b329d951f7cdef959e8635 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049697" comment="moodle-af less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049698" comment="moodle-ar less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049699" comment="moodle-be less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049700" comment="moodle-bg less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049701" comment="moodle-bs less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049702" comment="moodle-ca less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049703" comment="moodle-cs less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049704" comment="moodle-da less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049705" comment="moodle-de less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049706" comment="moodle-el less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049707" comment="moodle-es less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049708" comment="moodle-et less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049709" comment="moodle-eu less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049710" comment="moodle-fa less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049711" comment="moodle-fi less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049712" comment="moodle-fr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049713" comment="moodle-ga less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049714" comment="moodle-gl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049715" comment="moodle-he less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049716" comment="moodle-hi less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049717" comment="moodle-hr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049718" comment="moodle-hu less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049719" comment="moodle-id less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049720" comment="moodle-is less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049721" comment="moodle-it less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049722" comment="moodle-ja less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049723" comment="moodle-ka less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049724" comment="moodle-km less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049725" comment="moodle-kn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049726" comment="moodle-ko less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049727" comment="moodle-lt less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049728" comment="moodle-lv less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049729" comment="moodle-mi_tn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049730" comment="moodle-ms less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049731" comment="moodle-nl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049732" comment="moodle-nn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049733" comment="moodle-no less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049734" comment="moodle-pl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049735" comment="moodle-pt less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049736" comment="moodle-ro less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049737" comment="moodle-ru less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049738" comment="moodle-sk less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049739" comment="moodle-sl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049740" comment="moodle-so less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049741" comment="moodle-sq less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049742" comment="moodle-sr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049743" comment="moodle-sv less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049744" comment="moodle-th less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049745" comment="moodle-tl less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049746" comment="moodle-tr less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049747" comment="moodle-uk less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049748" comment="moodle-vi less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049749" comment="moodle-zh_cn less than 1.7.2-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049750" comment="moodle less than 1.7.2-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3330</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3330" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in services/obrowser/index.php in Horde 3.2 and Turba 2.2 allows remote attackers to inject arbitrary web script or HTML via the contact name.
	</description>
 </metadata>
<!-- 053dcf38e8e9d6fdeeb7f45d6ec75497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048431" comment="horde less than 3.1.3-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3337</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337" source="CVE"/>
	<description>
	PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.
	</description>
 </metadata>
<!-- 638eccb4311efca843f9620e49df0369 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049806" comment="pdns-backend-ldap less than 2.9.20-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049807" comment="pdns-backend-mysql less than 2.9.20-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049808" comment="pdns-backend-postgresql less than 2.9.20-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049809" comment="pdns-backend-sqlite2 less than 2.9.20-16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049810" comment="pdns less than 2.9.20-16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3422</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3422" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren).
	</description>
 </metadata>
<!-- 0172c8227ed27c753945cd3cbb221756 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049817" comment="bytefx-data-mysql less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049818" comment="ibm-data-db2 less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049819" comment="mono-core-32bit less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049820" comment="mono-core less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049821" comment="mono-data-firebird less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049822" comment="mono-data-oracle less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049823" comment="mono-data-postgresql less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049824" comment="mono-data-sqlite less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049825" comment="mono-data-sybase less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049826" comment="mono-data less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049827" comment="mono-devel less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049828" comment="mono-extras less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049829" comment="mono-jscript less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049830" comment="mono-locale-extras less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049831" comment="mono-nunit less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049832" comment="mono-web less than 1.1.18.1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049833" comment="mono-winforms less than 1.1.18.1-12.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3456</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3456" source="CVE"/>
	<description>
	phpMyAdmin before 2.11.8 does not sufficiently prevent its pages from using frames that point to pages in other domains, which makes it easier for remote attackers to conduct spoofing or phishing activities via a cross-site framing attack.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048382" comment="phpMyAdmin less than 2.9.1.1-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3457</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3457" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in setup.php in phpMyAdmin before 2.11.8 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted setup arguments.  NOTE: this issue can only be exploited in limited scenarios in which the attacker must be able to modify config/config.inc.php.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048382" comment="phpMyAdmin less than 2.9.1.1-9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3520</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520" source="CVE"/>
	<description>
	Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.
	</description>
 </metadata>
<!-- 1d512d5e7c85248991f695fbaab5b60b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049903" comment="jasper less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049904" comment="libjasper-32bit less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049905" comment="libjasper-64bit less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049906" comment="libjasper less than 1.701.0-41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3521</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521" source="CVE"/>
	<description>
	Race condition in the jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to cause a denial of service (program exit) by creating the appropriate tmp.XXXXXXXXXX temporary file, which causes Jasper to exit.  NOTE: this was originally reported as a symlink issue, but this was incorrect.  NOTE: some vendors dispute the severity of this issue, but it satisfies CVE's requirements for inclusion.
	</description>
 </metadata>
<!-- 1d512d5e7c85248991f695fbaab5b60b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049903" comment="jasper less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049904" comment="libjasper-32bit less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049905" comment="libjasper-64bit less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049906" comment="libjasper less than 1.701.0-41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
	<description>
	Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
	</description>
 </metadata>
<!-- 1d512d5e7c85248991f695fbaab5b60b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049903" comment="jasper less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049904" comment="libjasper-32bit less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049905" comment="libjasper-64bit less than 1.701.0-41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049906" comment="libjasper less than 1.701.0-41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3525</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525" source="CVE"/>
	<description>
	The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3527</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3527" source="CVE"/>
	<description>
	arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
	<description>
	The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations.  NOTE: there are limited scenarios in which this crosses privilege boundaries.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3529</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529" source="CVE"/>
	<description>
	Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.
	</description>
 </metadata>
<!-- cb85bf797f7a59a3d3dd88dcfdc9e054 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049684" comment="libxml2-32bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049685" comment="libxml2-64bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049686" comment="libxml2-devel-32bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049687" comment="libxml2-devel-64bit less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049688" comment="libxml2-devel less than 2.6.26-31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049689" comment="libxml2 less than 2.6.26-31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3546</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
	</description>
 </metadata>
<!-- df940324c4d021a37ad8504b3e520515 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049931" comment="git-arch less than 1.5.2.4-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049932" comment="git-core less than 1.5.2.4-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049933" comment="git-cvs less than 1.5.2.4-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049934" comment="git-email less than 1.5.2.4-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049935" comment="git-svn less than 1.5.2.4-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049936" comment="git less than 1.5.2.4-26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049937" comment="gitk less than 1.5.2.4-26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3639</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.
	</description>
 </metadata>
<!-- 3586142cf9caac3aeae282ce5f562d43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049973" comment="cups-client less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049974" comment="cups-devel less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049975" comment="cups-libs-32bit less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049976" comment="cups-libs-64bit less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049977" comment="cups-libs less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049978" comment="cups less than 1.2.7-12.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3640</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640" source="CVE"/>
	<description>
	Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 3586142cf9caac3aeae282ce5f562d43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049973" comment="cups-client less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049974" comment="cups-devel less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049975" comment="cups-libs-32bit less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049976" comment="cups-libs-64bit less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049977" comment="cups-libs less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049978" comment="cups less than 1.2.7-12.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3641</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641" source="CVE"/>
	<description>
	The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.
	</description>
 </metadata>
<!-- 3586142cf9caac3aeae282ce5f562d43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049973" comment="cups-client less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049974" comment="cups-devel less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049975" comment="cups-libs-32bit less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049976" comment="cups-libs-64bit less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049977" comment="cups-libs less than 1.2.7-12.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049978" comment="cups less than 1.2.7-12.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3651</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651" source="CVE"/>
	<description>
	Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
	</description>
 </metadata>
<!-- daac38ca0c5c3691baed09fffe2f0476 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050006" comment="ipsec-tools less than 0.6.5-42"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3652</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652" source="CVE"/>
	<description>
	src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).
	</description>
 </metadata>
<!-- daac38ca0c5c3691baed09fffe2f0476 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050006" comment="ipsec-tools less than 0.6.5-42"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3658</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658" source="CVE"/>
	<description>
	Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 7d59d98c96517376a88d8fdea1148b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050109" comment="apache2-mod_php5 less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050110" comment="php5-bcmath less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050111" comment="php5-bz2 less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050112" comment="php5-calendar less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050113" comment="php5-ctype less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050114" comment="php5-curl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050115" comment="php5-dba less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050116" comment="php5-dbase less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050117" comment="php5-devel less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050118" comment="php5-dom less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050119" comment="php5-exif less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050120" comment="php5-fastcgi less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050121" comment="php5-ftp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050122" comment="php5-gd less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050123" comment="php5-gettext less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050124" comment="php5-gmp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050125" comment="php5-hash less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050126" comment="php5-iconv less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050127" comment="php5-imap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050128" comment="php5-json less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050129" comment="php5-ldap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050130" comment="php5-mbstring less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050131" comment="php5-mcrypt less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050132" comment="php5-mhash less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050133" comment="php5-mysql less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050134" comment="php5-ncurses less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050135" comment="php5-odbc less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050136" comment="php5-openssl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050137" comment="php5-pcntl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050138" comment="php5-pdo less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050139" comment="php5-pear less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050140" comment="php5-pgsql less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050141" comment="php5-posix less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050142" comment="php5-pspell less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050143" comment="php5-readline less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050144" comment="php5-shmop less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050145" comment="php5-snmp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050146" comment="php5-soap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050147" comment="php5-sockets less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050148" comment="php5-sqlite less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050149" comment="php5-suhosin less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050150" comment="php5-sysvmsg less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050151" comment="php5-sysvsem less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050152" comment="php5-sysvshm less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050153" comment="php5-tidy less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050154" comment="php5-tokenizer less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050155" comment="php5-wddx less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050156" comment="php5-xmlreader less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050157" comment="php5-xmlrpc less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050158" comment="php5-xmlwriter less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050159" comment="php5-xsl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050160" comment="php5-zip less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050161" comment="php5-zlib less than 5.2.6-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3659</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659" source="CVE"/>
	<description>
	Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function.  NOTE: the scope of this issue is limited since most applications would not use an attacker-controlled delimiter, but local attacks against safe_mode are feasible.
	</description>
 </metadata>
<!-- 7d59d98c96517376a88d8fdea1148b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050109" comment="apache2-mod_php5 less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050110" comment="php5-bcmath less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050111" comment="php5-bz2 less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050112" comment="php5-calendar less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050113" comment="php5-ctype less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050114" comment="php5-curl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050115" comment="php5-dba less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050116" comment="php5-dbase less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050117" comment="php5-devel less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050118" comment="php5-dom less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050119" comment="php5-exif less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050120" comment="php5-fastcgi less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050121" comment="php5-ftp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050122" comment="php5-gd less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050123" comment="php5-gettext less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050124" comment="php5-gmp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050125" comment="php5-hash less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050126" comment="php5-iconv less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050127" comment="php5-imap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050128" comment="php5-json less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050129" comment="php5-ldap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050130" comment="php5-mbstring less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050131" comment="php5-mcrypt less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050132" comment="php5-mhash less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050133" comment="php5-mysql less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050134" comment="php5-ncurses less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050135" comment="php5-odbc less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050136" comment="php5-openssl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050137" comment="php5-pcntl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050138" comment="php5-pdo less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050139" comment="php5-pear less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050140" comment="php5-pgsql less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050141" comment="php5-posix less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050142" comment="php5-pspell less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050143" comment="php5-readline less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050144" comment="php5-shmop less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050145" comment="php5-snmp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050146" comment="php5-soap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050147" comment="php5-sockets less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050148" comment="php5-sqlite less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050149" comment="php5-suhosin less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050150" comment="php5-sysvmsg less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050151" comment="php5-sysvsem less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050152" comment="php5-sysvshm less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050153" comment="php5-tidy less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050154" comment="php5-tokenizer less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050155" comment="php5-wddx less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050156" comment="php5-xmlreader less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050157" comment="php5-xmlrpc less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050158" comment="php5-xmlwriter less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050159" comment="php5-xsl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050160" comment="php5-zip less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050161" comment="php5-zlib less than 5.2.6-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3660</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660" source="CVE"/>
	<description>
	PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.
	</description>
 </metadata>
<!-- 7d59d98c96517376a88d8fdea1148b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050109" comment="apache2-mod_php5 less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050110" comment="php5-bcmath less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050111" comment="php5-bz2 less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050112" comment="php5-calendar less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050113" comment="php5-ctype less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050114" comment="php5-curl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050115" comment="php5-dba less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050116" comment="php5-dbase less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050117" comment="php5-devel less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050118" comment="php5-dom less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050119" comment="php5-exif less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050120" comment="php5-fastcgi less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050121" comment="php5-ftp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050122" comment="php5-gd less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050123" comment="php5-gettext less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050124" comment="php5-gmp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050125" comment="php5-hash less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050126" comment="php5-iconv less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050127" comment="php5-imap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050128" comment="php5-json less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050129" comment="php5-ldap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050130" comment="php5-mbstring less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050131" comment="php5-mcrypt less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050132" comment="php5-mhash less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050133" comment="php5-mysql less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050134" comment="php5-ncurses less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050135" comment="php5-odbc less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050136" comment="php5-openssl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050137" comment="php5-pcntl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050138" comment="php5-pdo less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050139" comment="php5-pear less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050140" comment="php5-pgsql less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050141" comment="php5-posix less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050142" comment="php5-pspell less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050143" comment="php5-readline less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050144" comment="php5-shmop less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050145" comment="php5-snmp less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050146" comment="php5-soap less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050147" comment="php5-sockets less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050148" comment="php5-sqlite less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050149" comment="php5-suhosin less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050150" comment="php5-sysvmsg less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050151" comment="php5-sysvsem less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050152" comment="php5-sysvshm less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050153" comment="php5-tidy less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050154" comment="php5-tokenizer less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050155" comment="php5-wddx less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050156" comment="php5-xmlreader less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050157" comment="php5-xmlrpc less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050158" comment="php5-xmlwriter less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050159" comment="php5-xsl less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050160" comment="php5-zip less than 5.2.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050161" comment="php5-zlib less than 5.2.6-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3663</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3663" source="CVE"/>
	<description>
	Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 546854dc802924f689bc5b363da224bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050162" comment="squirrelmail less than 1.4.9a-2.10"/>
	</criteria>
	<!-- e60efb5da22a06f285046026708c3ba5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050163" comment="squirrelmail less than 1.4.9a-2.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3824</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3824" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in (1) Text_Filter/Filter/xss.php in Horde 3.1.x before 3.1.9 and 3.2.x before 3.2.2 and (2) externalinput.php in Popoon r22196 and earlier allows remote attackers to inject arbitrary web script or HTML by using / (slash) characters as replacements for spaces in an HTML e-mail message.
	</description>
 </metadata>
<!-- 053dcf38e8e9d6fdeeb7f45d6ec75497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048431" comment="horde less than 3.1.3-24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
	<description>
	pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
	</description>
 </metadata>
<!-- 3a9f497f4320c2dc6a5e5b07d0f5129d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050214" comment="pam_krb5-32bit less than 2.2.11-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050215" comment="pam_krb5-64bit less than 2.2.11-19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050216" comment="pam_krb5 less than 2.2.11-19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3833</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3833" source="CVE"/>
	<description>
	The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3834</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834" source="CVE"/>
	<description>
	The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
	</description>
 </metadata>
<!-- e7efef6764ce287b13bc6e9e31c2e424 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050279" comment="dbus-1-32bit less than 1.0.0-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050280" comment="dbus-1-64bit less than 1.0.0-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050281" comment="dbus-1-devel-doc less than 1.0.0-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050282" comment="dbus-1-devel less than 1.0.0-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050283" comment="dbus-1-x11 less than 1.0.0-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050284" comment="dbus-1 less than 1.0.0-11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3835</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3835" source="CVE"/>
	<description>
	The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3836</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3836" source="CVE"/>
	<description>
	feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3837</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3863</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863" source="CVE"/>
	<description>
	Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
	</description>
 </metadata>
<!-- 0c345c662d265ac43f250d57f85774a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050303" comment="enscript less than 1.6.4-41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3873</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873" source="CVE"/>
	<description>
	The System.setClipboard method in ActionScript in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to populate the clipboard with a URL that is difficult to delete and does not require user interaction to populate the clipboard, as exploited in the wild in August 2008.
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3912</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912" source="CVE"/>
	<description>
	libclamav in ClamAV before 0.94 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an out-of-memory condition.
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3913</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913" source="CVE"/>
	<description>
	Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a denial of service (memory consumption) via unspecified vectors related to "error handling logic".
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3914</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in ClamAV before 0.94 have unknown impact and attack vectors related to file descriptor leaks on the "error path" in (1) libclamav/others.c and (2) libclamav/sis.c.
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3933</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.
	</description>
 </metadata>
<!-- f86aecc9da711d00cd307dcd4daa82cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050314" comment="wireshark-devel less than 0.99.5-5.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050315" comment="wireshark less than 0.99.5-5.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3963</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3963" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
	</description>
 </metadata>
<!-- 995585682af30ee540bd5e36c5603dd2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050339" comment="mysql-Max less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050340" comment="mysql-bench less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050341" comment="mysql-client less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050342" comment="mysql-debug less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050343" comment="mysql-devel less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050344" comment="mysql-shared-32bit less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050345" comment="mysql-shared-64bit less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050346" comment="mysql-shared less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050347" comment="mysql less than 5.0.26-21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3970</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3970" source="CVE"/>
	<description>
	pam_mount 0.10 through 0.45, when luserconf is enabled, does not verify mountpoint and source ownership before mounting a user-defined volume, which allows local users to bypass intended access restrictions via a local mount.
	</description>
 </metadata>
<!-- 356fafd865d9a87cec63f644d32481f2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050361" comment="pam_mount less than 0.18-22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3972</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3972" source="CVE"/>
	<description>
	pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
	</description>
 </metadata>
<!-- c600d2f5bbb047710b6e84397c4fe84e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049074" comment="opensc-devel less than 0.11.1-22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049075" comment="opensc less than 0.11.1-22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4058</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4059</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4060</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4061</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061" source="CVE"/>
	<description>
	Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4062</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4063</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4064</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4065</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4066</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4066" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&amp;#56325ascript" sequence, aka "HTML escaped low surrogates bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4067</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4068</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4069</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4069" source="CVE"/>
	<description>
	The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4094</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
	</description>
 </metadata>
<!-- 4d2b352f81aa03a1a9dfc717b9da0c0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050366" comment="rubygem-activerecord less than 1.14.4-18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4097</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4097" source="CVE"/>
	<description>
	MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
	</description>
 </metadata>
<!-- 995585682af30ee540bd5e36c5603dd2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050339" comment="mysql-Max less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050340" comment="mysql-bench less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050341" comment="mysql-client less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050342" comment="mysql-debug less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050343" comment="mysql-devel less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050344" comment="mysql-shared-32bit less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050345" comment="mysql-shared-64bit less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050346" comment="mysql-shared less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050347" comment="mysql less than 5.0.26-21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4098</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4098" source="CVE"/>
	<description>
	MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
	</description>
 </metadata>
<!-- 995585682af30ee540bd5e36c5603dd2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050339" comment="mysql-Max less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050340" comment="mysql-bench less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050341" comment="mysql-client less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050342" comment="mysql-debug less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050343" comment="mysql-devel less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050344" comment="mysql-shared-32bit less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050345" comment="mysql-shared-64bit less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050346" comment="mysql-shared less than 5.0.26-21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050347" comment="mysql less than 5.0.26-21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4182</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4182" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in imp/test.php in Horde Turba Contact Manager H3 2.2.1 and other versions before 2.3.1, and possibly other Horde Project products, allows remote attackers to inject arbitrary web script or HTML via the User field in an IMAP session.
	</description>
 </metadata>
<!-- 17720f32e7411a0c200b3521299dfb29 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050374" comment="imp less than 4.1.3-66.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4210</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210" source="CVE"/>
	<description>
	fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
	<description>
	Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
	</description>
 </metadata>
<!-- a0c8660fc6823cc21b28e7d1652e5f1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050378" comment="libxml2-32bit less than 2.6.26-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050379" comment="libxml2-64bit less than 2.6.26-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050380" comment="libxml2-devel-32bit less than 2.6.26-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050381" comment="libxml2-devel-64bit less than 2.6.26-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050382" comment="libxml2-devel less than 2.6.26-35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050383" comment="libxml2 less than 2.6.26-35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
	<description>
	Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
	</description>
 </metadata>
<!-- 52e6b675302eb9e8aaa2c32fb904e24b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050405" comment="libxml2-32bit less than 2.6.26-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050406" comment="libxml2-64bit less than 2.6.26-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050407" comment="libxml2-devel-32bit less than 2.6.26-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050408" comment="libxml2-devel-64bit less than 2.6.26-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050409" comment="libxml2-devel less than 2.6.26-33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050410" comment="libxml2 less than 2.6.26-33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4298</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298" source="CVE"/>
	<description>
	Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers.
	</description>
 </metadata>
<!-- 77b95e94207378a6e05ed4ba981f1ed6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050426" comment="lighttpd-mod_cml less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050427" comment="lighttpd-mod_magnet less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050428" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050429" comment="lighttpd-mod_rrdtool less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050430" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050431" comment="lighttpd-mod_webdav less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050432" comment="lighttpd less than 1.4.13-41.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4302</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4302" source="CVE"/>
	<description>
	fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4309</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309" source="CVE"/>
	<description>
	Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.
	</description>
 </metadata>
<!-- fcc3110c158c9897a8a198784ef30794 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050454" comment="net-snmp-32bit less than 5.4.rc2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050455" comment="net-snmp-64bit less than 5.4.rc2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050456" comment="net-snmp-devel-64bit less than 5.4.rc2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050457" comment="net-snmp-devel less than 5.4.rc2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050458" comment="net-snmp less than 5.4.rc2-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050459" comment="perl-SNMP less than 5.4.rc2-10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4359</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359" source="CVE"/>
	<description>
	lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data.
	</description>
 </metadata>
<!-- 77b95e94207378a6e05ed4ba981f1ed6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050426" comment="lighttpd-mod_cml less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050427" comment="lighttpd-mod_magnet less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050428" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050429" comment="lighttpd-mod_rrdtool less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050430" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050431" comment="lighttpd-mod_webdav less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050432" comment="lighttpd less than 1.4.13-41.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4360</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360" source="CVE"/>
	<description>
	mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
	</description>
 </metadata>
<!-- 77b95e94207378a6e05ed4ba981f1ed6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050426" comment="lighttpd-mod_cml less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050427" comment="lighttpd-mod_magnet less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050428" comment="lighttpd-mod_mysql_vhost less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050429" comment="lighttpd-mod_rrdtool less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050430" comment="lighttpd-mod_trigger_b4_dl less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050431" comment="lighttpd-mod_webdav less than 1.4.13-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050432" comment="lighttpd less than 1.4.13-41.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4401</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401" source="CVE"/>
	<description>
	ActionScript in Adobe Flash Player 9.0.124.0 and earlier does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API, which allows remote attackers to create a browse dialog box, and possibly have unspecified other impact, via an SWF file.
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4474</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4474" source="CVE"/>
	<description>
	freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
	</description>
 </metadata>
<!-- 58a93e9c55869053248358502aeee0cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050802" comment="freeradius-devel less than 1.1.3-30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050803" comment="freeradius-dialupadmin less than 1.1.3-30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050804" comment="freeradius less than 1.1.3-30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4503</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503" source="CVE"/>
	<description>
	The Settings Manager in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to cause victims to unknowingly click on a link or dialog via access control dialogs disguised as normal graphical elements, as demonstrated by hijacking the camera or microphone, and related to "clickjacking."
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4555</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555" source="CVE"/>
	<description>
	Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements.
	</description>
 </metadata>
<!-- 2640a22b504713df35bbd8426673a4ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050836" comment="graphviz-devel less than 2.6-46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050837" comment="graphviz-tcl less than 2.6-46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050838" comment="graphviz less than 2.6-46"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4576</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4576" source="CVE"/>
	<description>
	sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.
	</description>
 </metadata>
<!-- 6f919f82aa6181ab6abc216a50e1b187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047581" comment="kernel-bigsmp less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047582" comment="kernel-default less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047583" comment="kernel-iseries64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047584" comment="kernel-kdump less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047585" comment="kernel-ppc64 less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047586" comment="kernel-source less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047587" comment="kernel-syms less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047588" comment="kernel-xen less than 2.6.18.8-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047589" comment="kernel-xenpae less than 2.6.18.8-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4680</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680" source="CVE"/>
	<description>
	packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).
	</description>
 </metadata>
<!-- f86aecc9da711d00cd307dcd4daa82cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050314" comment="wireshark-devel less than 0.99.5-5.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050315" comment="wireshark less than 0.99.5-5.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4681</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681" source="CVE"/>
	<description>
	Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
	</description>
 </metadata>
<!-- f86aecc9da711d00cd307dcd4daa82cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050314" comment="wireshark-devel less than 0.99.5-5.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050315" comment="wireshark less than 0.99.5-5.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4683</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683" source="CVE"/>
	<description>
	The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
	</description>
 </metadata>
<!-- f86aecc9da711d00cd307dcd4daa82cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050314" comment="wireshark-devel less than 0.99.5-5.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050315" comment="wireshark less than 0.99.5-5.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4684</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684" source="CVE"/>
	<description>
	packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle exceptions thrown by post dissectors, which allows remote attackers to cause a denial of service (application crash) via a certain series of packets, as demonstrated by enabling the (1) PRP or (2) MATE post dissector.
	</description>
 </metadata>
<!-- f86aecc9da711d00cd307dcd4daa82cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050314" comment="wireshark-devel less than 0.99.5-5.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050315" comment="wireshark less than 0.99.5-5.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4685</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.
	</description>
 </metadata>
<!-- f86aecc9da711d00cd307dcd4daa82cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050314" comment="wireshark-devel less than 0.99.5-5.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050315" comment="wireshark less than 0.99.5-5.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4690</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690" source="CVE"/>
	<description>
	lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
	</description>
 </metadata>
<!-- e318098af5c9ad5e5d2891944e05ac09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050925" comment="lynx less than 2.8.6_rel2-19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4694</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4694" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.60 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a redirect that specifies a crafted URL.
	</description>
 </metadata>
<!-- 091987756a0486cee873ae3cd55a9aa0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035993" comment="opera less than 9.60-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4695</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4695" source="CVE"/>
	<description>
	Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.
	</description>
 </metadata>
<!-- 091987756a0486cee873ae3cd55a9aa0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035993" comment="opera less than 9.60-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4696</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment"), which is not properly escaped before storage in the History Search database (aka md.dat).
	</description>
 </metadata>
<!-- 512ffce35c64301e871a11d8e561a8cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035994" comment="opera less than 9.61-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4697</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4697" source="CVE"/>
	<description>
	The Fast Forward feature in Opera before 9.61, when a page is located in a frame, executes a javascript: URL in the context of the outermost page instead of the page that contains this URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 512ffce35c64301e871a11d8e561a8cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035994" comment="opera less than 9.61-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4698</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4698" source="CVE"/>
	<description>
	Opera before 9.61 does not properly block scripts during preview of a news feed, which allows remote attackers to create arbitrary new feed subscriptions and read the contents of arbitrary feeds.
	</description>
 </metadata>
<!-- 512ffce35c64301e871a11d8e561a8cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035994" comment="opera less than 9.61-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4794</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4794" source="CVE"/>
	<description>
	Opera before 9.62 allows remote attackers to execute arbitrary commands via the History Search results page, a different vulnerability than CVE-2008-4696.
	</description>
 </metadata>
<!-- 991fc6e57c972ef152b927a22dd8b657 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035997" comment="opera less than 9.62-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4795</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4795" source="CVE"/>
	<description>
	The links panel in Opera before 9.62 processes Javascript within the context of the "outermost page" of a frame, which allows remote attackers to inject arbitrary web script or HTML via cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 991fc6e57c972ef152b927a22dd8b657 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035997" comment="opera less than 9.62-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4812</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4812" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat, and the Explorer extension (aka AcroRd32Info), 8.1.2, 8.1.1, and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that triggers an out-of-bounds write, related to parsing of Type 1 fonts.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4813</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a Collab object that trigger memory corruption, related to a GetCosObj method; or (2) contains a malformed PDF object that triggers memory corruption during parsing.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4814</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4814" source="CVE"/>
	<description>
	Unspecified vulnerability in a JavaScript method in Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allows remote attackers to execute arbitrary code via unknown vectors, related to an "input validation issue."
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4815</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4815" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4816</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4816" source="CVE"/>
	<description>
	Unspecified vulnerability in the Download Manager in Adobe Reader 8.1.2 and earlier on Windows allows remote attackers to change Internet Security options on a client machine via unknown vectors.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4817</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4817" source="CVE"/>
	<description>
	The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4824</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0 allow remote attackers to execute arbitrary code via unknown vectors related to "input validation errors."
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4865</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-4865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865" source="CVE"/>
	<description>
	Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options.  NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
	</description>
 </metadata>
<!-- d0bf9bf48ad271e4748f45908fc273cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050951" comment="valgrind less than 3.2.3-17.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5012</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker.  NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5013</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5014</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014" source="CVE"/>
	<description>
	jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5015</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5015" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4 assigns chrome privileges to a file: URI when it is accessed in the same tab from a chrome or privileged about: page, which makes it easier for user-assisted attackers to execute arbitrary JavaScript with chrome privileges via malicious code in a file that has already been saved on the local system.
	</description>
 </metadata>
<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5016</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5017</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017" source="CVE"/>
	<description>
	Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5018</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5019</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019" source="CVE"/>
	<description>
	The session restore feature in Mozilla Firefox 3.x before 3.0.4 and 2.x before 2.0.0.18 allows remote attackers to violate the same origin policy to conduct cross-site scripting (XSS) attacks and execute arbitrary JavaScript with chrome privileges via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5021</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021" source="CVE"/>
	<description>
	nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5022</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022" source="CVE"/>
	<description>
	The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5023</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023" source="CVE"/>
	<description>
	Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5024</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5050</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050" source="CVE"/>
	<description>
	Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 3e1b3ac70c8f64e9f5d3d51ffa68e942 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036036" comment="clamav-db less than 0.94.1-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033880" comment="clamav less than 0.94.1-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5052</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5052" source="CVE"/>
	<description>
	The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047654" comment="epiphany-devel less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047655" comment="epiphany-doc less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047656" comment="epiphany-extensions less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047657" comment="epiphany less than 2.16.1-35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051010" comment="MozillaThunderbird-translations less than 1.5.0.14-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051011" comment="MozillaThunderbird less than 1.5.0.14-0.10"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5187</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187" source="CVE"/>
	<description>
	The load function in the XPM loader for imlib2 1.4.2, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file that triggers a "pointer arithmetic error" and a heap-based buffer overflow, a different vulnerability than CVE-2008-2426.
	</description>
 </metadata>
<!-- c5eb91524d3b494f968a574f2345be31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051160" comment="imlib2-devel less than 1.2.1-48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051161" comment="imlib2-filters less than 1.2.1-48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051162" comment="imlib2-loaders less than 1.2.1-48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051163" comment="imlib2 less than 1.2.1-48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5189</title>
	<affected family="unix">
		<platform>openSUSE 10.2</platform>
	</affected>
	<reference ref_id="CVE-2008-5189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5189" source="CVE"/>
	<description>
	CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
	</description>
 </metadata>
<!-- e7005d334b9ba2f2def6cfab32062d35 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009038564" comment="suse102 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051168" comment="rubygem-actionpack less than 1.12.5-21"/>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038564" version="1" comment="suse-release is ==10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038565" version="1" comment="cron is &lt;4.1-70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038755" version="1" comment="apache2-mod_jk is &lt;4.1.30-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038756" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038757" version="1" comment="tomcat5-webapps is &lt;5.0.30-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038758" version="1" comment="tomcat5 is &lt;5.0.30-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009039431" version="1" comment="fetchmail is &lt;6.3.5-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009039948" version="1" comment="NX is &lt;1.5.0-75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034024" version="1" comment="seamonkey-dom-inspector is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034025" version="1" comment="seamonkey-irc is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034026" version="1" comment="seamonkey-mail is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034027" version="1" comment="seamonkey-spellchecker is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034028" version="1" comment="seamonkey-venkman is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034029" version="1" comment="seamonkey is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034030" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034031" version="1" comment="MozillaFirefox is &lt;2.0.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040765" version="1" comment="openssl-32bit is &lt;0.9.8d-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040766" version="1" comment="openssl-64bit is &lt;0.9.8d-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040767" version="1" comment="openssl-devel-32bit is &lt;0.9.8d-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040768" version="1" comment="openssl-devel-64bit is &lt;0.9.8d-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040769" version="1" comment="openssl-devel is &lt;0.9.8d-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040770" version="1" comment="openssl is &lt;0.9.8d-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040833" version="1" comment="capi4hylafax is &lt;4.3.0-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041460" version="1" comment="man is &lt;2.4.3-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041586" version="1" comment="perl-Tk is &lt;804.027-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041587" version="1" comment="tkimg is &lt;1.3-69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041590" version="1" comment="SDL_image-devel is &lt;1.2.5-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041591" version="1" comment="SDL_image is &lt;1.2.5-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041616" version="1" comment="gimp-devel is &lt;2.2.13-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041617" version="1" comment="gimp-unstable-devel is &lt;2.3.11-51.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041618" version="1" comment="gimp-unstable is &lt;2.3.11-51.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041619" version="1" comment="gimp is &lt;2.2.13-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030946" version="1" comment="flash-player is &lt;7.0.69.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042205" version="1" comment="GraphicsMagick-c++-devel is &lt;1.1.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042206" version="1" comment="GraphicsMagick-c++ is &lt;1.1.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042207" version="1" comment="GraphicsMagick-devel is &lt;1.1.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042208" version="1" comment="GraphicsMagick is &lt;1.1.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042209" version="1" comment="perl-GraphicsMagick is &lt;1.1.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042228" version="1" comment="ImageMagick-Magick++-devel is &lt;6.3.0.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042229" version="1" comment="ImageMagick-Magick++ is &lt;6.3.0.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042230" version="1" comment="ImageMagick-devel is &lt;6.3.0.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042231" version="1" comment="ImageMagick is &lt;6.3.0.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042232" version="1" comment="perl-PerlMagick is &lt;6.3.0.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042416" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042417" version="1" comment="kernel-default is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042418" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042419" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042420" version="1" comment="kernel-source is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042421" version="1" comment="kernel-syms is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042422" version="1" comment="kernel-xen is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042423" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042441" version="1" comment="apache2-devel is &lt;2.2.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042442" version="1" comment="apache2-doc is &lt;2.2.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042443" version="1" comment="apache2-example-pages is &lt;2.2.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042444" version="1" comment="apache2-prefork is &lt;2.2.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042445" version="1" comment="apache2-worker is &lt;2.2.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042446" version="1" comment="apache2 is &lt;2.2.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030972" version="1" comment="acroread is &lt;7.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042477" version="1" comment="evince is &lt;0.6.1-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033296" version="1" comment="clamav is &lt;0.88.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042612" version="1" comment="libsoup-32bit is &lt;2.2.96-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042613" version="1" comment="libsoup-64bit is &lt;2.2.96-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042614" version="1" comment="libsoup-devel-32bit is &lt;2.2.96-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042615" version="1" comment="libsoup-devel-64bit is &lt;2.2.96-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042616" version="1" comment="libsoup-devel is &lt;2.2.96-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042617" version="1" comment="libsoup is &lt;2.2.96-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042633" version="1" comment="seamonkey-dom-inspector is &lt;1.1.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042634" version="1" comment="seamonkey-irc is &lt;1.1.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042635" version="1" comment="seamonkey-mail is &lt;1.1.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042636" version="1" comment="seamonkey-spellchecker is &lt;1.1.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042637" version="1" comment="seamonkey-venkman is &lt;1.1.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042638" version="1" comment="seamonkey is &lt;1.1.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042657" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042658" version="1" comment="MozillaFirefox is &lt;2.0.0.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042663" version="1" comment="tar is &lt;1.15.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042666" version="1" comment="xorg-x11-server is &lt;7.2-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042679" version="1" comment="squirrelmail is &lt;1.4.9a-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042681" version="1" comment="squirrelmail is &lt;1.4.9a-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042691" version="1" comment="krb5-32bit is &lt;1.5.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042692" version="1" comment="krb5-64bit is &lt;1.5.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042693" version="1" comment="krb5-server is &lt;1.5.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042694" version="1" comment="krb5 is &lt;1.5.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042706" version="1" comment="gpg2 is &lt;1.9.22-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042707" version="1" comment="gpg is &lt;1.4.5-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042719" version="1" comment="ruby is &lt;1.8.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042813" version="1" comment="apache2-mod_php5 is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042814" version="1" comment="php5-bcmath is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042815" version="1" comment="php5-curl is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042816" version="1" comment="php5-dba is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042817" version="1" comment="php5-devel is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042818" version="1" comment="php5-dom is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042819" version="1" comment="php5-exif is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042820" version="1" comment="php5-fastcgi is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042821" version="1" comment="php5-ftp is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042822" version="1" comment="php5-gd is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042823" version="1" comment="php5-iconv is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042824" version="1" comment="php5-imap is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042825" version="1" comment="php5-ldap is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042826" version="1" comment="php5-mbstring is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042827" version="1" comment="php5-mhash is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042828" version="1" comment="php5-mysql is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042829" version="1" comment="php5-odbc is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042830" version="1" comment="php5-pear is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042831" version="1" comment="php5-pgsql is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042832" version="1" comment="php5-soap is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042833" version="1" comment="php5-sysvmsg is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042834" version="1" comment="php5-sysvshm is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042835" version="1" comment="php5-wddx is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042836" version="1" comment="php5-xmlrpc is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042837" version="1" comment="php5-zip is &lt;5.2.0-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042865" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042866" version="1" comment="MozillaFirefox is &lt;2.0.0.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042868" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042867" version="1" comment="MozillaThunderbird is &lt;1.5.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042925" version="1" comment="w3m is &lt;0.5.1-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042930" version="1" comment="cacti is &lt;0.8.6h-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042934" version="1" comment="avahi-devel is &lt;0.6.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042935" version="1" comment="avahi is &lt;0.6.14-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042957" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042958" version="1" comment="kernel-default is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042959" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042960" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042961" version="1" comment="kernel-source is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042962" version="1" comment="kernel-syms is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042963" version="1" comment="kernel-xen is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042964" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042965" version="1" comment="derby is &lt;10.3.1.4-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042998" version="1" comment="pcre-32bit is &lt;6.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042999" version="1" comment="pcre-64bit is &lt;6.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043000" version="1" comment="pcre-devel is &lt;6.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043001" version="1" comment="pcre is &lt;6.7-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043007" version="1" comment="pcre-32bit is &lt;6.7-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043008" version="1" comment="pcre-64bit is &lt;6.7-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043009" version="1" comment="pcre-devel is &lt;6.7-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043010" version="1" comment="pcre is &lt;6.7-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043029" version="1" comment="mysql-Max is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043030" version="1" comment="mysql-bench is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043031" version="1" comment="mysql-client is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043032" version="1" comment="mysql-debug is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043033" version="1" comment="mysql-devel is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043034" version="1" comment="mysql-shared-32bit is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043035" version="1" comment="mysql-shared-64bit is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043036" version="1" comment="mysql-shared is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043037" version="1" comment="mysql is &lt;5.0.26-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043039" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043040" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043041" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043042" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043043" version="1" comment="OpenOffice_org is &lt;2.0.4-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043176" version="1" comment="libwpd-devel is &lt;0.8.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043177" version="1" comment="libwpd-tools is &lt;0.8.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043178" version="1" comment="libwpd is &lt;0.8.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043207" version="1" comment="libwpd-devel is &lt;0.8.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043208" version="1" comment="libwpd is &lt;0.8.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043209" version="1" comment="pam-32bit is &lt;0.99.6.3-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043210" version="1" comment="pam-64bit is &lt;0.99.6.3-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043211" version="1" comment="pam is &lt;0.99.6.3-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043213" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043212" version="1" comment="MozillaThunderbird is &lt;1.5.0.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043214" version="1" comment="gtk2-32bit is &lt;2.10.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043215" version="1" comment="gtk2-64bit is &lt;2.10.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043216" version="1" comment="gtk2 is &lt;2.10.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043235" version="1" comment="xine-devel is &lt;1.1.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043236" version="1" comment="xine-extra is &lt;1.1.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043237" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043238" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043239" version="1" comment="xine-lib is &lt;1.1.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043240" version="1" comment="xine-ui-32bit is &lt;0.99.4-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043241" version="1" comment="xine-ui-64bit is &lt;0.99.4-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043242" version="1" comment="xine-ui is &lt;0.99.4-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031150" version="1" comment="flash-player is &lt;9.0.124.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043273" version="1" comment="koffice-wordprocessing is &lt;1.6.0-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043293" version="1" comment="cups-client is &lt;1.2.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043294" version="1" comment="cups-devel is &lt;1.2.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043295" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043296" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043297" version="1" comment="cups-libs is &lt;1.2.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043298" version="1" comment="cups is &lt;1.2.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043306" version="1" comment="xpdf is &lt;3.01-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043315" version="1" comment="gpdf is &lt;2.10.0-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043319" version="1" comment="poppler-devel is &lt;0.5.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043320" version="1" comment="poppler is &lt;0.5.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043323" version="1" comment="xpdf-tools is &lt;3.01-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043327" version="1" comment="koffice-wordprocessing is &lt;1.6.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043333" version="1" comment="kdegraphics3-pdf is &lt;3.5.5-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043336" version="1" comment="opera is &lt;9.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043337" version="1" comment="neon-32bit is &lt;0.26.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043338" version="1" comment="neon-64bit is &lt;0.26.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043339" version="1" comment="neon is &lt;0.26.1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043340" version="1" comment="mediawiki is &lt;1.8.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043348" version="1" comment="libgtop-32bit is &lt;2.14.4-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043349" version="1" comment="libgtop-64bit is &lt;2.14.4-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043350" version="1" comment="libgtop-devel is &lt;2.14.4-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043351" version="1" comment="libgtop is &lt;2.14.4-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043380" version="1" comment="libqt4-devel is &lt;4.2.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043381" version="1" comment="libqt4-x11 is &lt;4.2.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043382" version="1" comment="libqt4 is &lt;4.2.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043390" version="1" comment="qt3-32bit is &lt;3.3.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043391" version="1" comment="qt3-64bit is &lt;3.3.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043392" version="1" comment="qt3-devel-32bit is &lt;3.3.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043393" version="1" comment="qt3-devel-64bit is &lt;3.3.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043394" version="1" comment="qt3-devel is &lt;3.3.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043395" version="1" comment="qt3-static is &lt;3.3.7-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043396" version="1" comment="qt3 is &lt;3.3.7-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043419" version="1" comment="java-1_4_2-sun-alsa is &lt;1.4.2_update13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043420" version="1" comment="java-1_4_2-sun-devel is &lt;1.4.2_update13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043421" version="1" comment="java-1_4_2-sun-jdbc is &lt;1.4.2_update13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043422" version="1" comment="java-1_4_2-sun-plugin is &lt;1.4.2_update13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043423" version="1" comment="java-1_4_2-sun is &lt;1.4.2_update13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043437" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043438" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043439" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043440" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043441" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043442" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043443" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043445" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043446" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043447" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043448" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043449" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update10-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043477" version="1" comment="java-1_4_2-sun-alsa is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043478" version="1" comment="java-1_4_2-sun-demo is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043479" version="1" comment="java-1_4_2-sun-devel is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043480" version="1" comment="java-1_4_2-sun-jdbc is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043481" version="1" comment="java-1_4_2-sun-plugin is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043482" version="1" comment="java-1_4_2-sun-src is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043483" version="1" comment="java-1_4_2-sun is &lt;1.4.2_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043484" version="1" comment="pptpd is &lt;1.3.0-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043558" version="1" comment="OpenOffice_org-af is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043559" version="1" comment="OpenOffice_org-ar is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043560" version="1" comment="OpenOffice_org-ca is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043561" version="1" comment="OpenOffice_org-cs is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043562" version="1" comment="OpenOffice_org-da is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043563" version="1" comment="OpenOffice_org-de is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043564" version="1" comment="OpenOffice_org-es is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043565" version="1" comment="OpenOffice_org-fi is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043566" version="1" comment="OpenOffice_org-fr is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043567" version="1" comment="OpenOffice_org-galleries is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043568" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043569" version="1" comment="OpenOffice_org-gu-IN is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043570" version="1" comment="OpenOffice_org-hi-IN is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043571" version="1" comment="OpenOffice_org-hu is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043572" version="1" comment="OpenOffice_org-it is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043573" version="1" comment="OpenOffice_org-ja is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043574" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043575" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043576" version="1" comment="OpenOffice_org-nb is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043577" version="1" comment="OpenOffice_org-nl is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043578" version="1" comment="OpenOffice_org-nn is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043579" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043580" version="1" comment="OpenOffice_org-pl is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043581" version="1" comment="OpenOffice_org-pt-BR is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043582" version="1" comment="OpenOffice_org-ru is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043583" version="1" comment="OpenOffice_org-sk is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043584" version="1" comment="OpenOffice_org-sv is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043585" version="1" comment="OpenOffice_org-xh is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043586" version="1" comment="OpenOffice_org-zh-CN is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043587" version="1" comment="OpenOffice_org-zh-TW is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043588" version="1" comment="OpenOffice_org-zu is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043589" version="1" comment="OpenOffice_org is &lt;2.0.4-38.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043616" version="1" comment="squid is &lt;2.6.STABLE6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043624" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043625" version="1" comment="tomcat5-webapps is &lt;5.0.30-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043626" version="1" comment="tomcat5 is &lt;5.0.30-57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043633" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043634" version="1" comment="tomcat5-webapps is &lt;5.0.30-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043635" version="1" comment="tomcat5 is &lt;5.0.30-55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043640" version="1" comment="perl-spamassassin is &lt;3.1.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043655" version="1" comment="wireshark-devel is &lt;0.99.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043656" version="1" comment="wireshark is &lt;0.99.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043657" version="1" comment="ulogd is &lt;1.23-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034072" version="1" comment="rubygems is &lt;0.9.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043661" version="1" comment="smb4k is &lt;0.7.5-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043664" version="1" comment="bind-libs-32bit is &lt;9.3.2-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043665" version="1" comment="bind-libs-64bit is &lt;9.3.2-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043666" version="1" comment="bind-libs is &lt;9.3.2-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043668" version="1" comment="bind-utils is &lt;9.3.2-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043669" version="1" comment="bind is &lt;9.3.2-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043688" version="1" comment="kdelibs3-32bit is &lt;3.5.5-45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043689" version="1" comment="kdelibs3-64bit is &lt;3.5.5-45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043690" version="1" comment="kdelibs3-devel is &lt;3.5.5-45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043691" version="1" comment="kdelibs3 is &lt;3.5.5-45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043714" version="1" comment="postgresql-contrib is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043715" version="1" comment="postgresql-devel is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043716" version="1" comment="postgresql-docs is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043717" version="1" comment="postgresql-libs-32bit is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043718" version="1" comment="postgresql-libs-64bit is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043719" version="1" comment="postgresql-libs is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043720" version="1" comment="postgresql-pl is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043721" version="1" comment="postgresql-server is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043722" version="1" comment="postgresql is &lt;8.1.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043734" version="1" comment="kchmviewer is &lt;2.6-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043735" version="1" comment="chmlib-devel is &lt;0.39-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043736" version="1" comment="chmlib is &lt;0.39-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043747" version="1" comment="xmms-devel is &lt;1.2.10-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043748" version="1" comment="xmms-lib-32bit is &lt;1.2.10-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043749" version="1" comment="xmms-lib-64bit is &lt;1.2.10-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043750" version="1" comment="xmms-lib is &lt;1.2.10-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043751" version="1" comment="xmms is &lt;1.2.10-133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043805" version="1" comment="unrar is &lt;3.60.8-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033367" version="1" comment="clamav is &lt;0.90-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043902" version="1" comment="apache2-mod_php5 is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043903" version="1" comment="php5-bcmath is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043904" version="1" comment="php5-bz2 is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043905" version="1" comment="php5-calendar is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043906" version="1" comment="php5-ctype is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043907" version="1" comment="php5-curl is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043908" version="1" comment="php5-dba is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043909" version="1" comment="php5-dbase is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043910" version="1" comment="php5-devel is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043911" version="1" comment="php5-dom is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043912" version="1" comment="php5-exif is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043913" version="1" comment="php5-fastcgi is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043914" version="1" comment="php5-ftp is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043915" version="1" comment="php5-gd is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043916" version="1" comment="php5-gettext is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043917" version="1" comment="php5-gmp is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043918" version="1" comment="php5-iconv is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043919" version="1" comment="php5-imap is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043920" version="1" comment="php5-ldap is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043921" version="1" comment="php5-mbstring is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043922" version="1" comment="php5-mcrypt is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043923" version="1" comment="php5-mhash is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043924" version="1" comment="php5-mysql is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043925" version="1" comment="php5-ncurses is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043926" version="1" comment="php5-odbc is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043927" version="1" comment="php5-openssl is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043928" version="1" comment="php5-pcntl is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043929" version="1" comment="php5-pdo is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043930" version="1" comment="php5-pear is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043931" version="1" comment="php5-pgsql is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043932" version="1" comment="php5-posix is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043933" version="1" comment="php5-pspell is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043934" version="1" comment="php5-shmop is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043935" version="1" comment="php5-snmp is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043936" version="1" comment="php5-soap is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043937" version="1" comment="php5-sockets is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043938" version="1" comment="php5-sqlite is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043939" version="1" comment="php5-sysvmsg is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043940" version="1" comment="php5-sysvsem is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043941" version="1" comment="php5-sysvshm is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043942" version="1" comment="php5-tidy is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043943" version="1" comment="php5-tokenizer is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043944" version="1" comment="php5-wddx is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043945" version="1" comment="php5-xmlreader is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043946" version="1" comment="php5-xmlrpc is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043947" version="1" comment="php5-xsl is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043948" version="1" comment="php5-zlib is &lt;5.2.0-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043952" version="1" comment="krb5-apps-servers is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043968" version="1" comment="krb5-32bit is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043969" version="1" comment="krb5-64bit is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043970" version="1" comment="krb5-devel-32bit is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043971" version="1" comment="krb5-devel-64bit is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043972" version="1" comment="krb5-devel is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043973" version="1" comment="krb5-server is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043974" version="1" comment="krb5 is &lt;1.5.1-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044034" version="1" comment="apache2-mod_php5 is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044035" version="1" comment="php5-bcmath is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044036" version="1" comment="php5-bz2 is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044037" version="1" comment="php5-calendar is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044038" version="1" comment="php5-ctype is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044039" version="1" comment="php5-curl is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044040" version="1" comment="php5-dba is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044041" version="1" comment="php5-dbase is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044042" version="1" comment="php5-devel is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044043" version="1" comment="php5-dom is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044044" version="1" comment="php5-exif is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044045" version="1" comment="php5-fastcgi is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044046" version="1" comment="php5-ftp is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044047" version="1" comment="php5-gd is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044048" version="1" comment="php5-gettext is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044049" version="1" comment="php5-gmp is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044050" version="1" comment="php5-hash is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044051" version="1" comment="php5-iconv is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044052" version="1" comment="php5-imap is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044053" version="1" comment="php5-json is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044054" version="1" comment="php5-ldap is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044055" version="1" comment="php5-mbstring is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044056" version="1" comment="php5-mcrypt is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044057" version="1" comment="php5-mhash is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044058" version="1" comment="php5-mysql is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044059" version="1" comment="php5-ncurses is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044060" version="1" comment="php5-odbc is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044061" version="1" comment="php5-openssl is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044062" version="1" comment="php5-pcntl is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044063" version="1" comment="php5-pdo is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044064" version="1" comment="php5-pear is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044065" version="1" comment="php5-pgsql is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044066" version="1" comment="php5-posix is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044067" version="1" comment="php5-pspell is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044068" version="1" comment="php5-shmop is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044069" version="1" comment="php5-snmp is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044070" version="1" comment="php5-soap is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044071" version="1" comment="php5-sockets is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044072" version="1" comment="php5-sqlite is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044073" version="1" comment="php5-suhosin is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044074" version="1" comment="php5-sysvmsg is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044075" version="1" comment="php5-sysvsem is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044076" version="1" comment="php5-sysvshm is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044077" version="1" comment="php5-tidy is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044078" version="1" comment="php5-tokenizer is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044079" version="1" comment="php5-wddx is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044080" version="1" comment="php5-xmlreader is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044081" version="1" comment="php5-xmlrpc is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044082" version="1" comment="php5-xmlwriter is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044083" version="1" comment="php5-xsl is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044084" version="1" comment="php5-zip is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044085" version="1" comment="php5-zlib is &lt;5.2.0-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044283" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044284" version="1" comment="kernel-default is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044285" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044286" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044287" version="1" comment="kernel-source is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044288" version="1" comment="kernel-syms is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044289" version="1" comment="kernel-xen is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044290" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044294" version="1" comment="evolution-devel is &lt;2.8.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044295" version="1" comment="evolution-pilot is &lt;2.8.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044296" version="1" comment="evolution is &lt;2.8.2-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044315" version="1" comment="xorg-x11-Xvnc is &lt;7.1-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044316" version="1" comment="xorg-x11-libX11-32bit is &lt;7.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044317" version="1" comment="xorg-x11-libX11-64bit is &lt;7.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044318" version="1" comment="xorg-x11-libX11 is &lt;7.2-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044319" version="1" comment="xorg-x11-libs-32bit is &lt;7.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044320" version="1" comment="xorg-x11-libs-64bit is &lt;7.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044321" version="1" comment="xorg-x11-libs is &lt;7.2-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044322" version="1" comment="xorg-x11-server is &lt;7.2-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044336" version="1" comment="xgl is &lt;cvs_060522-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044337" version="1" comment="ekiga is &lt;2.0.3-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044342" version="1" comment="opera is &lt;9.20-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044353" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044354" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044355" version="1" comment="xine-lib is &lt;1.1.2-40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044361" version="1" comment="squirrelmail is &lt;1.4.9a-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044364" version="1" comment="squirrelmail is &lt;1.4.9a-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044367" version="1" comment="gpg is &lt;1.4.5-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044423" version="1" comment="asterisk is &lt;1.2.13-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044430" version="1" comment="phpMyAdmin is &lt;2.9.1.1-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044444" version="1" comment="freetype2-32bit is &lt;2.2.1.20061027-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044445" version="1" comment="freetype2-64bit is &lt;2.2.1.20061027-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044446" version="1" comment="freetype2-devel-32bit is &lt;2.2.1.20061027-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044447" version="1" comment="freetype2-devel-64bit is &lt;2.2.1.20061027-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044448" version="1" comment="freetype2-devel is &lt;2.2.1.20061027-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044449" version="1" comment="freetype2 is &lt;2.2.1.20061027-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044477" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044478" version="1" comment="MozillaThunderbird is &lt;1.5.0.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044490" version="1" comment="seamonkey-dom-inspector is &lt;1.1.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044491" version="1" comment="seamonkey-irc is &lt;1.1.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044492" version="1" comment="seamonkey-mail is &lt;1.1.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044493" version="1" comment="seamonkey-spellchecker is &lt;1.1.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044494" version="1" comment="seamonkey-venkman is &lt;1.1.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044495" version="1" comment="seamonkey is &lt;1.1.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044498" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044499" version="1" comment="MozillaFirefox is &lt;2.0.0.4-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044502" version="1" comment="ktorrent is &lt;2.0.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044503" version="1" comment="moodle-af is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044504" version="1" comment="moodle-ar is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044505" version="1" comment="moodle-be is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044506" version="1" comment="moodle-bg is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044507" version="1" comment="moodle-bs is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044508" version="1" comment="moodle-ca is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044509" version="1" comment="moodle-cs is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044510" version="1" comment="moodle-da is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044511" version="1" comment="moodle-de is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044512" version="1" comment="moodle-el is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044513" version="1" comment="moodle-es is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044514" version="1" comment="moodle-et is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044515" version="1" comment="moodle-eu is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044516" version="1" comment="moodle-fa is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044517" version="1" comment="moodle-fi is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044518" version="1" comment="moodle-fr is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044519" version="1" comment="moodle-ga is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044520" version="1" comment="moodle-gl is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044521" version="1" comment="moodle-he is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044522" version="1" comment="moodle-hi is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044523" version="1" comment="moodle-hr is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044524" version="1" comment="moodle-hu is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044525" version="1" comment="moodle-id is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044526" version="1" comment="moodle-is is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044527" version="1" comment="moodle-it is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044528" version="1" comment="moodle-ja is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044529" version="1" comment="moodle-ka is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044530" version="1" comment="moodle-km is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044531" version="1" comment="moodle-kn is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044532" version="1" comment="moodle-ko is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044533" version="1" comment="moodle-lt is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044534" version="1" comment="moodle-lv is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044535" version="1" comment="moodle-mi_tn is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044536" version="1" comment="moodle-ms is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044537" version="1" comment="moodle-nl is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044538" version="1" comment="moodle-nn is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044539" version="1" comment="moodle-no is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044540" version="1" comment="moodle-pl is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044541" version="1" comment="moodle-pt is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044542" version="1" comment="moodle-ro is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044543" version="1" comment="moodle-ru is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044544" version="1" comment="moodle-sk is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044545" version="1" comment="moodle-sl is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044546" version="1" comment="moodle-so is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044547" version="1" comment="moodle-sq is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044548" version="1" comment="moodle-sr is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044549" version="1" comment="moodle-sv is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044550" version="1" comment="moodle-th is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044551" version="1" comment="moodle-tl is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044552" version="1" comment="moodle-tr is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044553" version="1" comment="moodle-uk is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044554" version="1" comment="moodle-vi is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044555" version="1" comment="moodle-zh_cn is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044556" version="1" comment="moodle is &lt;1.7.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044559" version="1" comment="inkscape is &lt;0.44.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044563" version="1" comment="horde is &lt;3.1.3-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044574" version="1" comment="file-32bit is &lt;4.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044575" version="1" comment="file-64bit is &lt;4.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044576" version="1" comment="file-devel is &lt;4.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044577" version="1" comment="file is &lt;4.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044582" version="1" comment="mutt is &lt;1.5.13-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044583" version="1" comment="squid is &lt;2.6.STABLE6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044589" version="1" comment="pcre-32bit is &lt;6.7-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044590" version="1" comment="pcre-64bit is &lt;6.7-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044591" version="1" comment="pcre-devel is &lt;6.7-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044592" version="1" comment="pcre is &lt;6.7-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044606" version="1" comment="ImageMagick-Magick++-devel is &lt;6.3.0.0-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044607" version="1" comment="ImageMagick-Magick++ is &lt;6.3.0.0-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044608" version="1" comment="ImageMagick-devel is &lt;6.3.0.0-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044609" version="1" comment="ImageMagick is &lt;6.3.0.0-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044610" version="1" comment="perl-PerlMagick is &lt;6.3.0.0-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044616" version="1" comment="GraphicsMagick-c++-devel is &lt;1.1.7-35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044617" version="1" comment="GraphicsMagick-c++ is &lt;1.1.7-35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044618" version="1" comment="GraphicsMagick-devel is &lt;1.1.7-35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044619" version="1" comment="GraphicsMagick is &lt;1.1.7-35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044620" version="1" comment="perl-GraphicsMagick is &lt;1.1.7-35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033476" version="1" comment="clamav is &lt;0.90.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044632" version="1" comment="ImageMagick-Magick++-devel is &lt;6.3.0.0-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044633" version="1" comment="ImageMagick-Magick++ is &lt;6.3.0.0-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044634" version="1" comment="ImageMagick-devel is &lt;6.3.0.0-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044635" version="1" comment="ImageMagick is &lt;6.3.0.0-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044636" version="1" comment="perl-PerlMagick is &lt;6.3.0.0-27.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044642" version="1" comment="pulseaudio-devel is &lt;0.9.5-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044643" version="1" comment="pulseaudio-libs is &lt;0.9.5-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044644" version="1" comment="pulseaudio is &lt;0.9.5-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044647" version="1" comment="ipsec-tools is &lt;0.6.5-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044652" version="1" comment="apache2-mod_jk is &lt;4.1.30-13.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044656" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044657" version="1" comment="tomcat5-webapps is &lt;5.0.30-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044658" version="1" comment="tomcat5 is &lt;5.0.30-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044662" version="1" comment="xscreensaver is &lt;5.01-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044665" version="1" comment="lighttpd is &lt;1.4.13-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044671" version="1" comment="quagga-devel is &lt;0.98.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044672" version="1" comment="quagga is &lt;0.98.6-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044678" version="1" comment="flash-player is &lt;9.0.48.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044687" version="1" comment="kdebase3-32bit is &lt;3.5.5-102.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044688" version="1" comment="kdebase3-64bit is &lt;3.5.5-102.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044689" version="1" comment="kdebase3 is &lt;3.5.5-102.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044696" version="1" comment="freeradius-devel is &lt;1.1.3-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044697" version="1" comment="freeradius is &lt;1.1.3-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044702" version="1" comment="python-32bit is &lt;2.5-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044703" version="1" comment="python-64bit is &lt;2.5-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044704" version="1" comment="python-devel is &lt;2.5-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044705" version="1" comment="python is &lt;2.5-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044713" version="1" comment="dovecot is &lt;1.0.rc14-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044721" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044722" version="1" comment="kernel-default is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044723" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044724" version="1" comment="kernel-kdump is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044725" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044726" version="1" comment="kernel-source is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044727" version="1" comment="kernel-syms is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044728" version="1" comment="kernel-xen is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044729" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044742" version="1" comment="gimp-unstable is &lt;2.3.11-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044747" version="1" comment="gimp is &lt;2.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044748" version="1" comment="gvim is &lt;7.0-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044749" version="1" comment="vim-enhanced is &lt;7.0-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044764" version="1" comment="krb5-32bit is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044765" version="1" comment="krb5-64bit is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044766" version="1" comment="krb5-devel-32bit is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044767" version="1" comment="krb5-devel-64bit is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044768" version="1" comment="krb5-devel is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044769" version="1" comment="krb5-server is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044770" version="1" comment="krb5 is &lt;1.5.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044772" version="1" comment="libmsrpc-devel is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044773" version="1" comment="libmsrpc is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044774" version="1" comment="libsmbclient-32bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044775" version="1" comment="libsmbclient-64bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044776" version="1" comment="libsmbclient-devel is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044777" version="1" comment="libsmbclient is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044778" version="1" comment="samba-32bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044779" version="1" comment="samba-64bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044780" version="1" comment="samba-client-32bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044781" version="1" comment="samba-client-64bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044782" version="1" comment="samba-client is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044783" version="1" comment="samba-python is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044784" version="1" comment="samba-winbind-32bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044785" version="1" comment="samba-winbind-64bit is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044786" version="1" comment="samba-winbind is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044787" version="1" comment="samba is &lt;3.0.23d-19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044797" version="1" comment="libpng-32bit is &lt;1.2.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044798" version="1" comment="libpng-64bit is &lt;1.2.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044799" version="1" comment="libpng-devel-32bit is &lt;1.2.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044800" version="1" comment="libpng-devel-64bit is &lt;1.2.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044801" version="1" comment="libpng-devel is &lt;1.2.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044802" version="1" comment="libpng is &lt;1.2.12-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044857" version="1" comment="cifs-mount is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044858" version="1" comment="ldapsmb is &lt;1.34b-27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044859" version="1" comment="libmsrpc-devel is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044860" version="1" comment="libmsrpc is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044861" version="1" comment="libsmbclient-32bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044862" version="1" comment="libsmbclient-64bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044863" version="1" comment="libsmbclient-devel is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044864" version="1" comment="libsmbclient is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044865" version="1" comment="samba-32bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044866" version="1" comment="samba-64bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044867" version="1" comment="samba-client-32bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044868" version="1" comment="samba-client-64bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044869" version="1" comment="samba-client is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044870" version="1" comment="samba-pdb is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044871" version="1" comment="samba-python is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044872" version="1" comment="samba-vscan is &lt;0.3.6b-98.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044873" version="1" comment="samba-winbind-32bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044874" version="1" comment="samba-winbind-64bit is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044875" version="1" comment="samba-winbind is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044876" version="1" comment="samba is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044915" version="1" comment="gnash is &lt;0.7.1.cvs20061019-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044918" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044919" version="1" comment="kernel-default is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044920" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044921" version="1" comment="kernel-kdump is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044922" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044923" version="1" comment="kernel-source is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044924" version="1" comment="kernel-syms is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044925" version="1" comment="kernel-xen is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044926" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044952" version="1" comment="mysql-Max is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044953" version="1" comment="mysql-bench is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044954" version="1" comment="mysql-client is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044955" version="1" comment="mysql-debug is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044956" version="1" comment="mysql-devel is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044957" version="1" comment="mysql-shared-32bit is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044958" version="1" comment="mysql-shared-64bit is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044959" version="1" comment="mysql-shared is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044960" version="1" comment="mysql is &lt;5.0.26-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044965" version="1" comment="libexif-32bit is &lt;0.6.14-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044966" version="1" comment="libexif-64bit is &lt;0.6.14-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044967" version="1" comment="libexif is &lt;0.6.14-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044969" version="1" comment="libexif5 is &lt;0.5.12-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044974" version="1" comment="clamav-db is &lt;0.90.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033510" version="1" comment="clamav is &lt;0.90.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044978" version="1" comment="xfsdump is &lt;2.2.42_1-12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044994" version="1" comment="jasper is &lt;1.701.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044995" version="1" comment="libjasper-32bit is &lt;1.701.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044996" version="1" comment="libjasper-64bit is &lt;1.701.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044997" version="1" comment="libjasper is &lt;1.701.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045005" version="1" comment="libnetpbm-32bit is &lt;1.0.0-678" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045006" version="1" comment="libnetpbm-64bit is &lt;1.0.0-678" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045007" version="1" comment="libnetpbm is &lt;1.0.0-678" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045008" version="1" comment="netpbm is &lt;10.26.22-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045113" version="1" comment="apache2-mod_php5 is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045114" version="1" comment="php5-bcmath is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045115" version="1" comment="php5-bz2 is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045116" version="1" comment="php5-calendar is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045117" version="1" comment="php5-ctype is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045118" version="1" comment="php5-curl is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045119" version="1" comment="php5-dba is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045120" version="1" comment="php5-dbase is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045121" version="1" comment="php5-devel is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045122" version="1" comment="php5-dom is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045123" version="1" comment="php5-exif is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045124" version="1" comment="php5-fastcgi is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045125" version="1" comment="php5-ftp is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045126" version="1" comment="php5-gd is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045127" version="1" comment="php5-gettext is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045128" version="1" comment="php5-gmp is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045129" version="1" comment="php5-hash is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045130" version="1" comment="php5-iconv is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045131" version="1" comment="php5-imap is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045132" version="1" comment="php5-json is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045133" version="1" comment="php5-ldap is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045134" version="1" comment="php5-mbstring is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045135" version="1" comment="php5-mcrypt is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045136" version="1" comment="php5-mhash is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045137" version="1" comment="php5-mysql is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045138" version="1" comment="php5-ncurses is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045139" version="1" comment="php5-odbc is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045140" version="1" comment="php5-openssl is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045141" version="1" comment="php5-pcntl is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045142" version="1" comment="php5-pdo is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045143" version="1" comment="php5-pear is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045144" version="1" comment="php5-pgsql is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045145" version="1" comment="php5-posix is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045146" version="1" comment="php5-pspell is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045147" version="1" comment="php5-shmop is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045148" version="1" comment="php5-snmp is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045149" version="1" comment="php5-soap is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045150" version="1" comment="php5-sockets is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045151" version="1" comment="php5-sqlite is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045152" version="1" comment="php5-suhosin is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045153" version="1" comment="php5-sysvmsg is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045154" version="1" comment="php5-sysvsem is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045155" version="1" comment="php5-sysvshm is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045156" version="1" comment="php5-tidy is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045157" version="1" comment="php5-tokenizer is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045158" version="1" comment="php5-wddx is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045159" version="1" comment="php5-xmlreader is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045160" version="1" comment="php5-xmlrpc is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045161" version="1" comment="php5-xmlwriter is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045162" version="1" comment="php5-xsl is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045163" version="1" comment="php5-zip is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045164" version="1" comment="php5-zlib is &lt;5.2.0-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045227" version="1" comment="liblcms-32bit is &lt;1.15-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045228" version="1" comment="liblcms-64bit is &lt;1.15-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045229" version="1" comment="liblcms-devel-32bit is &lt;1.15-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045230" version="1" comment="liblcms-devel-64bit is &lt;1.15-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045231" version="1" comment="liblcms-devel is &lt;1.15-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045232" version="1" comment="liblcms is &lt;1.15-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045250" version="1" comment="freetype2-32bit is &lt;2.2.1.20061027-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045251" version="1" comment="freetype2-64bit is &lt;2.2.1.20061027-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045252" version="1" comment="freetype2-devel-32bit is &lt;2.2.1.20061027-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045253" version="1" comment="freetype2-devel-64bit is &lt;2.2.1.20061027-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045254" version="1" comment="freetype2-devel is &lt;2.2.1.20061027-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045255" version="1" comment="freetype2 is &lt;2.2.1.20061027-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045258" version="1" comment="gd-devel is &lt;2.0.32-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045259" version="1" comment="gd is &lt;2.0.32-51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045290" version="1" comment="file-32bit is &lt;4.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045291" version="1" comment="file-64bit is &lt;4.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045292" version="1" comment="file-devel is &lt;4.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045293" version="1" comment="file is &lt;4.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045309" version="1" comment="emacs-el is &lt;21.3-251" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045310" version="1" comment="emacs-info is &lt;21.3-251" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045311" version="1" comment="emacs-nox is &lt;21.3-251" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045312" version="1" comment="emacs-x11 is &lt;21.3-251" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045313" version="1" comment="emacs is &lt;21.3-251" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045381" version="1" comment="OpenOffice_org-af is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045382" version="1" comment="OpenOffice_org-ar is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045383" version="1" comment="OpenOffice_org-be-BY is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045384" version="1" comment="OpenOffice_org-bg is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045385" version="1" comment="OpenOffice_org-ca is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045386" version="1" comment="OpenOffice_org-cs is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045387" version="1" comment="OpenOffice_org-cy is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045388" version="1" comment="OpenOffice_org-da is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045389" version="1" comment="OpenOffice_org-de is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045390" version="1" comment="OpenOffice_org-el is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045391" version="1" comment="OpenOffice_org-en-GB is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045392" version="1" comment="OpenOffice_org-es is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045393" version="1" comment="OpenOffice_org-et is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045394" version="1" comment="OpenOffice_org-fi is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045395" version="1" comment="OpenOffice_org-fr is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045396" version="1" comment="OpenOffice_org-galleries is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045397" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045398" version="1" comment="OpenOffice_org-gu-IN is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045399" version="1" comment="OpenOffice_org-hi-IN is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045400" version="1" comment="OpenOffice_org-hr is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045401" version="1" comment="OpenOffice_org-hu is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045402" version="1" comment="OpenOffice_org-it is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045403" version="1" comment="OpenOffice_org-ja is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045404" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045405" version="1" comment="OpenOffice_org-km is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045406" version="1" comment="OpenOffice_org-ko is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045407" version="1" comment="OpenOffice_org-lt is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045408" version="1" comment="OpenOffice_org-mk is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045409" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045410" version="1" comment="OpenOffice_org-nb is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045411" version="1" comment="OpenOffice_org-nl is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045412" version="1" comment="OpenOffice_org-nn is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045413" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045414" version="1" comment="OpenOffice_org-pa-IN is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045415" version="1" comment="OpenOffice_org-pl is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045416" version="1" comment="OpenOffice_org-pt-BR is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045417" version="1" comment="OpenOffice_org-pt is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045418" version="1" comment="OpenOffice_org-ru is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045419" version="1" comment="OpenOffice_org-rw is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045420" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045421" version="1" comment="OpenOffice_org-sdk is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045422" version="1" comment="OpenOffice_org-sk is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045423" version="1" comment="OpenOffice_org-sl is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045424" version="1" comment="OpenOffice_org-sr-CS is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045425" version="1" comment="OpenOffice_org-st is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045426" version="1" comment="OpenOffice_org-sv is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045427" version="1" comment="OpenOffice_org-tr is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045428" version="1" comment="OpenOffice_org-ts is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045429" version="1" comment="OpenOffice_org-vi is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045430" version="1" comment="OpenOffice_org-xh is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045431" version="1" comment="OpenOffice_org-zh-CN is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045432" version="1" comment="OpenOffice_org-zh-TW is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045433" version="1" comment="OpenOffice_org-zu is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045434" version="1" comment="OpenOffice_org is &lt;2.0.4-38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045475" version="1" comment="phpPgAdmin is &lt;4.0.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045476" version="1" comment="apache2-mod_php5 is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045477" version="1" comment="php5-bcmath is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045478" version="1" comment="php5-bz2 is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045479" version="1" comment="php5-calendar is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045480" version="1" comment="php5-ctype is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045481" version="1" comment="php5-curl is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045482" version="1" comment="php5-dba is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045483" version="1" comment="php5-dbase is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045484" version="1" comment="php5-devel is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045485" version="1" comment="php5-dom is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045486" version="1" comment="php5-exif is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045487" version="1" comment="php5-fastcgi is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045488" version="1" comment="php5-ftp is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045489" version="1" comment="php5-gd is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045490" version="1" comment="php5-gettext is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045491" version="1" comment="php5-gmp is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045492" version="1" comment="php5-hash is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045493" version="1" comment="php5-iconv is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045494" version="1" comment="php5-imap is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045495" version="1" comment="php5-json is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045496" version="1" comment="php5-ldap is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045497" version="1" comment="php5-mbstring is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045498" version="1" comment="php5-mcrypt is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045499" version="1" comment="php5-mhash is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045500" version="1" comment="php5-mysql is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045501" version="1" comment="php5-ncurses is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045502" version="1" comment="php5-odbc is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045503" version="1" comment="php5-openssl is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045504" version="1" comment="php5-pcntl is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045505" version="1" comment="php5-pdo is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045506" version="1" comment="php5-pear is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045507" version="1" comment="php5-pgsql is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045508" version="1" comment="php5-posix is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045509" version="1" comment="php5-pspell is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045510" version="1" comment="php5-shmop is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045511" version="1" comment="php5-snmp is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045512" version="1" comment="php5-soap is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045513" version="1" comment="php5-sockets is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045514" version="1" comment="php5-sqlite is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045515" version="1" comment="php5-suhosin is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045516" version="1" comment="php5-sysvmsg is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045517" version="1" comment="php5-sysvsem is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045518" version="1" comment="php5-sysvshm is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045519" version="1" comment="php5-tidy is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045520" version="1" comment="php5-tokenizer is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045521" version="1" comment="php5-wddx is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045522" version="1" comment="php5-xmlreader is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045523" version="1" comment="php5-xmlrpc is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045524" version="1" comment="php5-xmlwriter is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045525" version="1" comment="php5-xsl is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045526" version="1" comment="php5-zip is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045527" version="1" comment="php5-zlib is &lt;5.2.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045533" version="1" comment="bind-libs-32bit is &lt;9.3.2-56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045534" version="1" comment="bind-libs-64bit is &lt;9.3.2-56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045535" version="1" comment="bind-libs is &lt;9.3.2-56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045536" version="1" comment="bind-utils is &lt;9.3.2-56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045537" version="1" comment="bind is &lt;9.3.2-56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045562" version="1" comment="gimp-devel is &lt;2.2.13-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045563" version="1" comment="gimp-unstable-devel is &lt;2.3.11-51.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045564" version="1" comment="gimp-unstable is &lt;2.3.11-51.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045565" version="1" comment="gimp is &lt;2.2.13-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045571" version="1" comment="kvirc is &lt;3.2.5-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045574" version="1" comment="gvim is &lt;7.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045575" version="1" comment="vim-enhanced is &lt;7.0-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045577" version="1" comment="pfstools is &lt;1.5-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045580" version="1" comment="sylpheed-claws is &lt;2.5.5-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045581" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045582" version="1" comment="MozillaFirefox is &lt;2.0.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045596" version="1" comment="seamonkey-dom-inspector is &lt;1.1.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045597" version="1" comment="seamonkey-irc is &lt;1.1.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045598" version="1" comment="seamonkey-mail is &lt;1.1.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045599" version="1" comment="seamonkey-spellchecker is &lt;1.1.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045600" version="1" comment="seamonkey-venkman is &lt;1.1.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045601" version="1" comment="seamonkey is &lt;1.1.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045603" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.12-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045604" version="1" comment="MozillaThunderbird is &lt;1.5.0.12-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045621" version="1" comment="open-iscsi is &lt;2.0.713-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045646" version="1" comment="libvorbis-32bit is &lt;1.1.2-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045647" version="1" comment="libvorbis-64bit is &lt;1.1.2-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045648" version="1" comment="libvorbis-devel is &lt;1.1.2-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045649" version="1" comment="libvorbis is &lt;1.1.2-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045651" version="1" comment="rubygem-activesupport is &lt;1.3.1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045661" version="1" comment="evolution-data-server-32bit is &lt;1.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045662" version="1" comment="evolution-data-server-64bit is &lt;1.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045663" version="1" comment="evolution-data-server-devel is &lt;1.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045664" version="1" comment="evolution-data-server is &lt;1.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045676" version="1" comment="avahi-compat-howl-devel is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045677" version="1" comment="avahi-compat-howl is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045678" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045679" version="1" comment="avahi-compat-mDNSResponder is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045680" version="1" comment="avahi-devel is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045681" version="1" comment="avahi-glib is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045682" version="1" comment="avahi-mono is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045683" version="1" comment="avahi-qt3 is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045684" version="1" comment="avahi-qt4 is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045685" version="1" comment="avahi is &lt;0.6.14-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045688" version="1" comment="perl-Net-DNS is &lt;0.59-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045703" version="1" comment="kdegraphics3-pdf is &lt;3.5.5-43.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045708" version="1" comment="poppler-devel is &lt;0.5.4-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045709" version="1" comment="poppler is &lt;0.5.4-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045721" version="1" comment="xpdf-tools is &lt;3.01-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045722" version="1" comment="xpdf is &lt;3.01-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045729" version="1" comment="cups-client is &lt;1.2.7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045730" version="1" comment="cups-devel is &lt;1.2.7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045731" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045732" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045733" version="1" comment="cups-libs is &lt;1.2.7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045734" version="1" comment="cups is &lt;1.2.7-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045749" version="1" comment="qt3-32bit is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045750" version="1" comment="qt3-64bit is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045751" version="1" comment="qt3-devel-32bit is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045752" version="1" comment="qt3-devel-64bit is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045753" version="1" comment="qt3-devel is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045754" version="1" comment="qt3-static is &lt;3.3.7-17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045755" version="1" comment="qt3 is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045767" version="1" comment="wireshark-devel is &lt;0.99.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045768" version="1" comment="wireshark is &lt;0.99.5-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045774" version="1" comment="RealPlayer is &lt;10.0.5-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045771" version="1" comment="RealPlayer is &lt;10.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045781" version="1" comment="gd-devel is &lt;2.0.32-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045782" version="1" comment="gd is &lt;2.0.32-53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045784" version="1" comment="bsdtar is &lt;1.3.1-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045785" version="1" comment="libarchive-devel is &lt;1.3.1-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045786" version="1" comment="libarchive is &lt;1.3.1-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045804" version="1" comment="clamav-db is &lt;0.91.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033599" version="1" comment="clamav is &lt;0.91.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045808" version="1" comment="asterisk is &lt;1.2.13-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045818" version="1" comment="mysql-Max is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045819" version="1" comment="mysql-bench is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045820" version="1" comment="mysql-client is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045821" version="1" comment="mysql-debug is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045822" version="1" comment="mysql-devel is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045823" version="1" comment="mysql-shared-32bit is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045824" version="1" comment="mysql-shared-64bit is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045825" version="1" comment="mysql-shared is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045826" version="1" comment="mysql is &lt;5.0.26-14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045829" version="1" comment="tcpdump is &lt;3.9.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045830" version="1" comment="opera is &lt;9.22-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045873" version="1" comment="xorg-x11-server-sdk is &lt;7.2-30.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045874" version="1" comment="xorg-x11-server is &lt;7.2-30.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045876" version="1" comment="lighttpd is &lt;1.4.13-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045897" version="1" comment="krb5-32bit is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045898" version="1" comment="krb5-64bit is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045899" version="1" comment="krb5-apps-clients is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045900" version="1" comment="krb5-apps-servers is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045901" version="1" comment="krb5-client is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045902" version="1" comment="krb5-devel-32bit is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045903" version="1" comment="krb5-devel-64bit is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045904" version="1" comment="krb5-devel is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045905" version="1" comment="krb5-server is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045906" version="1" comment="krb5 is &lt;1.5.1-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045909" version="1" comment="librpcsecgss is &lt;0.14-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045932" version="1" comment="krb5-32bit is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045933" version="1" comment="krb5-64bit is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045934" version="1" comment="krb5-apps-clients is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045935" version="1" comment="krb5-apps-servers is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045936" version="1" comment="krb5-client is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045937" version="1" comment="krb5-devel-32bit is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045938" version="1" comment="krb5-devel-64bit is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045939" version="1" comment="krb5-devel is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045940" version="1" comment="krb5-server is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045941" version="1" comment="krb5 is &lt;1.5.1-23.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045950" version="1" comment="libvorbis-32bit is &lt;1.1.2-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045951" version="1" comment="libvorbis-64bit is &lt;1.1.2-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045952" version="1" comment="libvorbis-devel is &lt;1.1.2-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045953" version="1" comment="libvorbis is &lt;1.1.2-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045961" version="1" comment="t1lib-devel is &lt;1.3.1-608" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045962" version="1" comment="t1lib is &lt;1.3.1-608" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045968" version="1" comment="festival-devel is &lt;1.96-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045969" version="1" comment="festival is &lt;1.96-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045973" version="1" comment="rsync is &lt;2.6.8-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045976" version="1" comment="star is &lt;1.5a70-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045978" version="1" comment="tar is &lt;1.15.1-42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009045999" version="1" comment="qt3-32bit is &lt;3.3.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046000" version="1" comment="qt3-64bit is &lt;3.3.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046001" version="1" comment="qt3-devel-32bit is &lt;3.3.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046002" version="1" comment="qt3-devel-64bit is &lt;3.3.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046003" version="1" comment="qt3-devel-doc is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046004" version="1" comment="qt3-devel-tools-64bit is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046005" version="1" comment="qt3-devel-tools is &lt;3.3.7-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046006" version="1" comment="qt3-devel is &lt;3.3.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046007" version="1" comment="qt3-static is &lt;3.3.7-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046008" version="1" comment="qt3 is &lt;3.3.7-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046052" version="1" comment="fileshareset is &lt;2.0-242.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046053" version="1" comment="kdebase3-32bit is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046054" version="1" comment="kdebase3-64bit is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046055" version="1" comment="kdebase3-beagle is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046056" version="1" comment="kdebase3-devel is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046057" version="1" comment="kdebase3-extra is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046058" version="1" comment="kdebase3-kdm is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046059" version="1" comment="kdebase3-ksysguardd is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046060" version="1" comment="kdebase3-nsplugin is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046061" version="1" comment="kdebase3-samba is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046062" version="1" comment="kdebase3-session is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046063" version="1" comment="kdebase3 is &lt;3.5.5-102.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046064" version="1" comment="kdelibs3-32bit is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046065" version="1" comment="kdelibs3-64bit is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046066" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046067" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046068" version="1" comment="kdelibs3-arts is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046069" version="1" comment="kdelibs3-devel is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046070" version="1" comment="kdelibs3-doc is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046071" version="1" comment="kdelibs3 is &lt;3.5.5-45.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034168" version="1" comment="flash-player is &lt;9.0.115.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031401" version="1" comment="flash-player is &lt;9.0.151.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046084" version="1" comment="cups-client is &lt;1.2.7-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046085" version="1" comment="cups-devel is &lt;1.2.7-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046086" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046087" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046088" version="1" comment="cups-libs is &lt;1.2.7-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046089" version="1" comment="cups is &lt;1.2.7-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046092" version="1" comment="gpdf is &lt;2.10.0-82.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046105" version="1" comment="cups-client is &lt;1.2.7-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046106" version="1" comment="cups-devel is &lt;1.2.7-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046107" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046108" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046109" version="1" comment="cups-libs is &lt;1.2.7-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046110" version="1" comment="cups is &lt;1.2.7-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046122" version="1" comment="poppler-devel is &lt;0.5.4-33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046123" version="1" comment="poppler-glib is &lt;0.5.4-33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046124" version="1" comment="poppler-qt is &lt;0.5.4-33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046125" version="1" comment="poppler-tools is &lt;0.5.4-33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046126" version="1" comment="poppler is &lt;0.5.4-33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046143" version="1" comment="koffice-database-mysql is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046144" version="1" comment="koffice-database-psql is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046145" version="1" comment="koffice-database is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046146" version="1" comment="koffice-devel is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046147" version="1" comment="koffice-extra is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046148" version="1" comment="koffice-illustration is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046149" version="1" comment="koffice-planning is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046150" version="1" comment="koffice-presentation is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046151" version="1" comment="koffice-python is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046152" version="1" comment="koffice-ruby is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046153" version="1" comment="koffice-spreadsheet is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046154" version="1" comment="koffice-wordprocessing is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046155" version="1" comment="koffice is &lt;1.6.0-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046164" version="1" comment="xpdf-tools is &lt;3.01-58.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046165" version="1" comment="xpdf is &lt;3.01-58.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046179" version="1" comment="opera is &lt;9.23-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046204" version="1" comment="id3lib-devel is &lt;3.8.3-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046205" version="1" comment="id3lib-examples is &lt;3.8.3-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046206" version="1" comment="id3lib is &lt;3.8.3-126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046209" version="1" comment="cpio is &lt;2.6-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046213" version="1" comment="tar is &lt;1.15.1-42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046218" version="1" comment="clamav-db is &lt;0.91.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046219" version="1" comment="clamav is &lt;0.91.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046224" version="1" comment="fetchmail is &lt;6.3.5-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046225" version="1" comment="fetchmailconf is &lt;6.3.5-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046280" version="1" comment="xorg-x11-Xvnc is &lt;7.1-33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046281" version="1" comment="xorg-x11-devel-32bit is &lt;7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046282" version="1" comment="xorg-x11-devel-64bit is &lt;7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046283" version="1" comment="xorg-x11-devel is &lt;7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046284" version="1" comment="xorg-x11-doc is &lt;7.2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046285" version="1" comment="xorg-x11-libs-32bit is &lt;7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046286" version="1" comment="xorg-x11-libs-64bit is &lt;7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046287" version="1" comment="xorg-x11-libs is &lt;7.2-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046288" version="1" comment="xorg-x11-server-sdk is &lt;7.2-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046289" version="1" comment="xorg-x11-server is &lt;7.2-30.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046290" version="1" comment="xorg-x11 is &lt;7.2-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046335" version="1" comment="cifs-mount is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046336" version="1" comment="ldapsmb is &lt;1.34b-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046337" version="1" comment="libmsrpc-devel is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046338" version="1" comment="libmsrpc is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046339" version="1" comment="libsmbclient-32bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046340" version="1" comment="libsmbclient-64bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046341" version="1" comment="libsmbclient-devel is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046342" version="1" comment="libsmbclient is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046343" version="1" comment="samba-32bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046344" version="1" comment="samba-64bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046345" version="1" comment="samba-client-32bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046346" version="1" comment="samba-client-64bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046347" version="1" comment="samba-client is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046348" version="1" comment="samba-doc is &lt;3.0.23d-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046349" version="1" comment="samba-krb-printing is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046350" version="1" comment="samba-pdb is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046351" version="1" comment="samba-python is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046352" version="1" comment="samba-vscan is &lt;0.3.6b-98.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046353" version="1" comment="samba-winbind-32bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046354" version="1" comment="samba-winbind-64bit is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046355" version="1" comment="samba-winbind is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046356" version="1" comment="samba is &lt;3.0.23d-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046426" version="1" comment="OpenOffice_org-af is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046427" version="1" comment="OpenOffice_org-af is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046428" version="1" comment="OpenOffice_org-ar is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046429" version="1" comment="OpenOffice_org-ar is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046430" version="1" comment="OpenOffice_org-be-BY is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046431" version="1" comment="OpenOffice_org-be-BY is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046432" version="1" comment="OpenOffice_org-bg is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046433" version="1" comment="OpenOffice_org-bg is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046434" version="1" comment="OpenOffice_org-ca is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046435" version="1" comment="OpenOffice_org-ca is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046436" version="1" comment="OpenOffice_org-cs is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046437" version="1" comment="OpenOffice_org-cs is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046438" version="1" comment="OpenOffice_org-cy is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046439" version="1" comment="OpenOffice_org-cy is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046440" version="1" comment="OpenOffice_org-da is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046441" version="1" comment="OpenOffice_org-da is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046442" version="1" comment="OpenOffice_org-de is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046443" version="1" comment="OpenOffice_org-de is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046444" version="1" comment="OpenOffice_org-el is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046445" version="1" comment="OpenOffice_org-el is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046446" version="1" comment="OpenOffice_org-en-GB is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046447" version="1" comment="OpenOffice_org-en-GB is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046448" version="1" comment="OpenOffice_org-es is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046449" version="1" comment="OpenOffice_org-es is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046450" version="1" comment="OpenOffice_org-et is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046451" version="1" comment="OpenOffice_org-et is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046452" version="1" comment="OpenOffice_org-fi is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046453" version="1" comment="OpenOffice_org-fi is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046454" version="1" comment="OpenOffice_org-fr is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046455" version="1" comment="OpenOffice_org-fr is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046456" version="1" comment="OpenOffice_org-galleries is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046457" version="1" comment="OpenOffice_org-galleries is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046458" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046459" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046460" version="1" comment="OpenOffice_org-gu-IN is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046461" version="1" comment="OpenOffice_org-gu-IN is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046462" version="1" comment="OpenOffice_org-hi-IN is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046463" version="1" comment="OpenOffice_org-hi-IN is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046464" version="1" comment="OpenOffice_org-hr is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046465" version="1" comment="OpenOffice_org-hr is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046466" version="1" comment="OpenOffice_org-hu is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046467" version="1" comment="OpenOffice_org-hu is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046468" version="1" comment="OpenOffice_org-it is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046469" version="1" comment="OpenOffice_org-it is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046470" version="1" comment="OpenOffice_org-ja is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046471" version="1" comment="OpenOffice_org-ja is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046472" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046473" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046474" version="1" comment="OpenOffice_org-km is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046475" version="1" comment="OpenOffice_org-km is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046476" version="1" comment="OpenOffice_org-ko is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046477" version="1" comment="OpenOffice_org-ko is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046478" version="1" comment="OpenOffice_org-lt is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046479" version="1" comment="OpenOffice_org-lt is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046480" version="1" comment="OpenOffice_org-mk is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046481" version="1" comment="OpenOffice_org-mk is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046482" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046483" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046484" version="1" comment="OpenOffice_org-nb is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046485" version="1" comment="OpenOffice_org-nb is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046486" version="1" comment="OpenOffice_org-nl is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046487" version="1" comment="OpenOffice_org-nl is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046488" version="1" comment="OpenOffice_org-nn is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046489" version="1" comment="OpenOffice_org-nn is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046490" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046491" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046492" version="1" comment="OpenOffice_org-pa-IN is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046493" version="1" comment="OpenOffice_org-pa-IN is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046494" version="1" comment="OpenOffice_org-pl is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046495" version="1" comment="OpenOffice_org-pl is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046496" version="1" comment="OpenOffice_org-pt-BR is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046497" version="1" comment="OpenOffice_org-pt-BR is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046498" version="1" comment="OpenOffice_org-pt is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046499" version="1" comment="OpenOffice_org-pt is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046500" version="1" comment="OpenOffice_org-ru is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046501" version="1" comment="OpenOffice_org-ru is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046502" version="1" comment="OpenOffice_org-rw is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046503" version="1" comment="OpenOffice_org-rw is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046504" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046505" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046506" version="1" comment="OpenOffice_org-sdk is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046507" version="1" comment="OpenOffice_org-sdk is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046508" version="1" comment="OpenOffice_org-sk is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046509" version="1" comment="OpenOffice_org-sk is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046510" version="1" comment="OpenOffice_org-sl is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046511" version="1" comment="OpenOffice_org-sl is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046512" version="1" comment="OpenOffice_org-sr-CS is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046513" version="1" comment="OpenOffice_org-sr-CS is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046514" version="1" comment="OpenOffice_org-st is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046515" version="1" comment="OpenOffice_org-st is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046516" version="1" comment="OpenOffice_org-sv is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046517" version="1" comment="OpenOffice_org-sv is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046518" version="1" comment="OpenOffice_org-tr is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046519" version="1" comment="OpenOffice_org-tr is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046520" version="1" comment="OpenOffice_org-ts is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046521" version="1" comment="OpenOffice_org-ts is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046522" version="1" comment="OpenOffice_org-vi is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046523" version="1" comment="OpenOffice_org-vi is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046524" version="1" comment="OpenOffice_org-xh is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046525" version="1" comment="OpenOffice_org-xh is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046526" version="1" comment="OpenOffice_org-zh-CN is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046527" version="1" comment="OpenOffice_org-zh-CN is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046528" version="1" comment="OpenOffice_org-zh-TW is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046529" version="1" comment="OpenOffice_org-zh-TW is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046530" version="1" comment="OpenOffice_org-zu is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046531" version="1" comment="OpenOffice_org-zu is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046532" version="1" comment="OpenOffice_org is &lt;2.0.4-38.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046533" version="1" comment="OpenOffice_org is &lt;2.0.4-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046575" version="1" comment="flac-32bit is &lt;1.1.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046576" version="1" comment="flac-64bit is &lt;1.1.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046577" version="1" comment="flac-devel is &lt;1.1.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046578" version="1" comment="flac is &lt;1.1.2-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046591" version="1" comment="lighttpd-mod_cml is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046592" version="1" comment="lighttpd-mod_magnet is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046593" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046594" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046595" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046596" version="1" comment="lighttpd-mod_webdav is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046597" version="1" comment="lighttpd is &lt;1.4.13-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046602" version="1" comment="openssh-askpass is &lt;4.4p1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046603" version="1" comment="openssh is &lt;4.4p1-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046613" version="1" comment="postgresql-contrib is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046614" version="1" comment="postgresql-devel is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046615" version="1" comment="postgresql-docs is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046616" version="1" comment="postgresql-libs-32bit is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046617" version="1" comment="postgresql-libs-64bit is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046618" version="1" comment="postgresql-libs is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046619" version="1" comment="postgresql-pl is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046620" version="1" comment="postgresql-server is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046621" version="1" comment="postgresql is &lt;8.1.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046623" version="1" comment="OpenOffice_org-af is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046624" version="1" comment="OpenOffice_org-ar is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046625" version="1" comment="OpenOffice_org-be-BY is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046626" version="1" comment="OpenOffice_org-bg is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046627" version="1" comment="OpenOffice_org-ca is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046628" version="1" comment="OpenOffice_org-cs is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046629" version="1" comment="OpenOffice_org-cy is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046630" version="1" comment="OpenOffice_org-da is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046631" version="1" comment="OpenOffice_org-de is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046632" version="1" comment="OpenOffice_org-el is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046633" version="1" comment="OpenOffice_org-en-GB is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046634" version="1" comment="OpenOffice_org-es is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046635" version="1" comment="OpenOffice_org-et is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046636" version="1" comment="OpenOffice_org-fi is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046637" version="1" comment="OpenOffice_org-fr is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046638" version="1" comment="OpenOffice_org-galleries is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046639" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046640" version="1" comment="OpenOffice_org-gu-IN is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046641" version="1" comment="OpenOffice_org-hi-IN is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046642" version="1" comment="OpenOffice_org-hr is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046643" version="1" comment="OpenOffice_org-hu is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046644" version="1" comment="OpenOffice_org-it is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046645" version="1" comment="OpenOffice_org-ja is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046646" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046647" version="1" comment="OpenOffice_org-km is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046648" version="1" comment="OpenOffice_org-ko is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046649" version="1" comment="OpenOffice_org-lt is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046650" version="1" comment="OpenOffice_org-mk is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046651" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046652" version="1" comment="OpenOffice_org-nb is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046653" version="1" comment="OpenOffice_org-nl is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046654" version="1" comment="OpenOffice_org-nn is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046655" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046656" version="1" comment="OpenOffice_org-pa-IN is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046657" version="1" comment="OpenOffice_org-pl is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046658" version="1" comment="OpenOffice_org-pt-BR is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046659" version="1" comment="OpenOffice_org-pt is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046660" version="1" comment="OpenOffice_org-ru is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046661" version="1" comment="OpenOffice_org-rw is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046662" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046663" version="1" comment="OpenOffice_org-sdk is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046664" version="1" comment="OpenOffice_org-sk is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046665" version="1" comment="OpenOffice_org-sl is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046666" version="1" comment="OpenOffice_org-sr-CS is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046667" version="1" comment="OpenOffice_org-st is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046668" version="1" comment="OpenOffice_org-sv is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046669" version="1" comment="OpenOffice_org-tr is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046670" version="1" comment="OpenOffice_org-ts is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046671" version="1" comment="OpenOffice_org-vi is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046672" version="1" comment="OpenOffice_org-xh is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046673" version="1" comment="OpenOffice_org-zh-CN is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046674" version="1" comment="OpenOffice_org-zh-TW is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046675" version="1" comment="OpenOffice_org-zu is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046676" version="1" comment="OpenOffice_org is &lt;2.0.4-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046687" version="1" comment="icu-data is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046688" version="1" comment="icu is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046689" version="1" comment="libicu-32bit is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046690" version="1" comment="libicu-64bit is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046691" version="1" comment="libicu-devel-32bit is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046692" version="1" comment="libicu-devel-64bit is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046693" version="1" comment="libicu-devel is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046694" version="1" comment="libicu-doc is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046695" version="1" comment="libicu is &lt;3.4-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046704" version="1" comment="epiphany-devel is &lt;2.16.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046705" version="1" comment="epiphany-doc is &lt;2.16.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046706" version="1" comment="epiphany-extensions is &lt;2.16.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046707" version="1" comment="epiphany is &lt;2.16.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034372" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034374" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034375" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034376" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034377" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034378" version="1" comment="MozillaFirefox is &lt;2.0.0.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034379" version="1" comment="seamonkey-dom-inspector is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034380" version="1" comment="seamonkey-irc is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034381" version="1" comment="seamonkey-mail is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034382" version="1" comment="seamonkey-spellchecker is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034383" version="1" comment="seamonkey-venkman is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034384" version="1" comment="seamonkey is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046715" version="1" comment="opal-devel is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046716" version="1" comment="opal is &lt;2.3.1-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046731" version="1" comment="python-32bit is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046732" version="1" comment="python-64bit is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046733" version="1" comment="python-curses is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046734" version="1" comment="python-demo is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046735" version="1" comment="python-devel is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046736" version="1" comment="python-gdbm is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046737" version="1" comment="python-idle is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046738" version="1" comment="python-tk is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046739" version="1" comment="python-xml is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046740" version="1" comment="python is &lt;2.5-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046748" version="1" comment="libsndfile-32bit is &lt;1.0.17-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046749" version="1" comment="libsndfile-64bit is &lt;1.0.17-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046750" version="1" comment="libsndfile-devel is &lt;1.0.17-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046751" version="1" comment="libsndfile-octave is &lt;1.0.17-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046752" version="1" comment="libsndfile-progs is &lt;1.0.17-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046753" version="1" comment="libsndfile is &lt;1.0.17-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046763" version="1" comment="GraphicsMagick-c++-devel is &lt;1.1.7-35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046764" version="1" comment="GraphicsMagick-c++ is &lt;1.1.7-35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046765" version="1" comment="GraphicsMagick-devel is &lt;1.1.7-35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046766" version="1" comment="GraphicsMagick is &lt;1.1.7-35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046767" version="1" comment="perl-GraphicsMagick is &lt;1.1.7-35.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046773" version="1" comment="ImageMagick-Magick++-devel is &lt;6.3.0.0-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046774" version="1" comment="ImageMagick-Magick++ is &lt;6.3.0.0-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046775" version="1" comment="ImageMagick-devel is &lt;6.3.0.0-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046776" version="1" comment="ImageMagick is &lt;6.3.0.0-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046777" version="1" comment="perl-PerlMagick is &lt;6.3.0.0-27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046786" version="1" comment="openssl-32bit is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046787" version="1" comment="openssl-64bit is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046788" version="1" comment="openssl-devel-32bit is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046789" version="1" comment="openssl-devel-64bit is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046790" version="1" comment="openssl-devel is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046791" version="1" comment="openssl-doc is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046792" version="1" comment="openssl is &lt;0.9.8d-23.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046799" version="1" comment="apache2-devel is &lt;2.2.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046800" version="1" comment="apache2-doc is &lt;2.2.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046801" version="1" comment="apache2-example-pages is &lt;2.2.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046802" version="1" comment="apache2-prefork is &lt;2.2.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046803" version="1" comment="apache2-worker is &lt;2.2.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046804" version="1" comment="apache2 is &lt;2.2.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046807" version="1" comment="balsa is &lt;2.3.13-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046814" version="1" comment="perl-32bit is &lt;5.8.8-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046815" version="1" comment="perl-64bit is &lt;5.8.8-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046816" version="1" comment="perl is &lt;5.8.8-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046841" version="1" comment="openssl-32bit is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046842" version="1" comment="openssl-64bit is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046843" version="1" comment="openssl-devel-32bit is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046844" version="1" comment="openssl-devel-64bit is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046845" version="1" comment="openssl-devel is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046846" version="1" comment="openssl-doc is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046847" version="1" comment="openssl is &lt;0.9.8d-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046848" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046849" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046850" version="1" comment="compat-openssl097g is &lt;0.9.7g-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046861" version="1" comment="tk-32bit is &lt;8.4.14-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046862" version="1" comment="tk-64bit is &lt;8.4.14-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046863" version="1" comment="tk-devel is &lt;8.4.14-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046864" version="1" comment="tk is &lt;8.4.14-13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046872" version="1" comment="ruby-devel is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046873" version="1" comment="ruby-doc-html is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046874" version="1" comment="ruby-doc-ri is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046875" version="1" comment="ruby-examples is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046876" version="1" comment="ruby-test-suite is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046877" version="1" comment="ruby-tk is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046878" version="1" comment="ruby is &lt;1.8.5-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046915" version="1" comment="bytefx-data-mysql is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046916" version="1" comment="ibm-data-db2 is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046917" version="1" comment="mono-basic is &lt;1.1.18-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046918" version="1" comment="mono-core-32bit is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046919" version="1" comment="mono-core is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046920" version="1" comment="mono-data-firebird is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046921" version="1" comment="mono-data-oracle is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046922" version="1" comment="mono-data-postgresql is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046923" version="1" comment="mono-data-sqlite is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046924" version="1" comment="mono-data-sybase is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046925" version="1" comment="mono-data is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046926" version="1" comment="mono-devel is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046927" version="1" comment="mono-extras is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046928" version="1" comment="mono-jscript is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046929" version="1" comment="mono-locale-extras is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046930" version="1" comment="mono-nunit is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046931" version="1" comment="mono-web is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046932" version="1" comment="mono-winforms is &lt;1.1.18.1-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046959" version="1" comment="nagios-plugins-extras is &lt;1.4.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046960" version="1" comment="nagios-plugins is &lt;1.4.5-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046965" version="1" comment="hugin is &lt;0.6.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046968" version="1" comment="hplip-hpijs is &lt;1.6.10-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046969" version="1" comment="hplip is &lt;1.6.10-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034451" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034452" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034453" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034454" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034455" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034456" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034457" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046993" version="1" comment="java-1_4_2-sun-alsa is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046994" version="1" comment="java-1_4_2-sun-demo is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046995" version="1" comment="java-1_4_2-sun-devel is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046996" version="1" comment="java-1_4_2-sun-jdbc is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046997" version="1" comment="java-1_4_2-sun-plugin is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046998" version="1" comment="java-1_4_2-sun-src is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009046999" version="1" comment="java-1_4_2-sun is &lt;1.4.2_update16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047020" version="1" comment="libpng-32bit is &lt;1.2.12-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047021" version="1" comment="libpng-64bit is &lt;1.2.12-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047022" version="1" comment="libpng-devel-32bit is &lt;1.2.12-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047023" version="1" comment="libpng-devel-64bit is &lt;1.2.12-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047024" version="1" comment="libpng-devel is &lt;1.2.12-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047025" version="1" comment="libpng is &lt;1.2.12-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047026" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047027" version="1" comment="MozillaThunderbird is &lt;1.5.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047031" version="1" comment="rubygem-actionpack is &lt;1.12.5-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047034" version="1" comment="kdegraphics3-pdf is &lt;3.5.5-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047059" version="1" comment="e2fsprogs-32bit is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047060" version="1" comment="e2fsprogs-64bit is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047061" version="1" comment="e2fsprogs-devel-32bit is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047062" version="1" comment="e2fsprogs-devel-64bit is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047063" version="1" comment="e2fsprogs-devel is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047064" version="1" comment="e2fsprogs is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047065" version="1" comment="libcom_err-32bit is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047066" version="1" comment="libcom_err-64bit is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047067" version="1" comment="libcom_err is &lt;1.39-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047072" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047073" version="1" comment="kernel-default is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047074" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047075" version="1" comment="kernel-kdump is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047076" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047077" version="1" comment="kernel-source is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047078" version="1" comment="kernel-syms is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047079" version="1" comment="kernel-xen is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047080" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047105" version="1" comment="cairo-32bit is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047106" version="1" comment="cairo-64bit is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047107" version="1" comment="cairo-devel is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047108" version="1" comment="cairo-doc is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047109" version="1" comment="cairo is &lt;1.2.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034507" version="1" comment="opera is &lt;9.24-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047117" version="1" comment="phpMyAdmin is &lt;2.9.1.1-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047118" version="1" comment="nagios-www is &lt;2.5-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047119" version="1" comment="nagios is &lt;2.5-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047131" version="1" comment="openldap2-back-meta is &lt;2.3.27-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047132" version="1" comment="openldap2-back-perl is &lt;2.3.27-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047133" version="1" comment="openldap2-devel-32bit is &lt;2.3.27-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047134" version="1" comment="openldap2-devel-64bit is &lt;2.3.27-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047135" version="1" comment="openldap2-devel is &lt;2.3.27-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047136" version="1" comment="openldap2 is &lt;2.3.27-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047147" version="1" comment="xorg-x11-devel-32bit is &lt;7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047148" version="1" comment="xorg-x11-devel-64bit is &lt;7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047149" version="1" comment="xorg-x11-devel is &lt;7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047150" version="1" comment="xorg-x11-libs-32bit is &lt;7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047151" version="1" comment="xorg-x11-libs-64bit is &lt;7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047152" version="1" comment="xorg-x11-libs is &lt;7.2-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047153" version="1" comment="xorg-x11-server-sdk is &lt;7.2-30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047154" version="1" comment="xorg-x11-server is &lt;7.2-30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047160" version="1" comment="nss_ldap-32bit is &lt;253-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047161" version="1" comment="nss_ldap-64bit is &lt;253-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047162" version="1" comment="nss_ldap is &lt;253-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047173" version="1" comment="net-snmp-32bit is &lt;5.4.rc2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047174" version="1" comment="net-snmp-64bit is &lt;5.4.rc2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047175" version="1" comment="net-snmp-devel-64bit is &lt;5.4.rc2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047176" version="1" comment="net-snmp-devel is &lt;5.4.rc2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047177" version="1" comment="net-snmp is &lt;5.4.rc2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047178" version="1" comment="perl-SNMP is &lt;5.4.rc2-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047185" version="1" comment="cups-client is &lt;1.2.7-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047186" version="1" comment="cups-devel is &lt;1.2.7-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047187" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047188" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047189" version="1" comment="cups-libs is &lt;1.2.7-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047190" version="1" comment="cups is &lt;1.2.7-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047203" version="1" comment="krb5-32bit is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047204" version="1" comment="krb5-64bit is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047205" version="1" comment="krb5-apps-clients is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047206" version="1" comment="krb5-apps-servers is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047207" version="1" comment="krb5-client is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047208" version="1" comment="krb5-devel-32bit is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047209" version="1" comment="krb5-devel-64bit is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047210" version="1" comment="krb5-devel is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047211" version="1" comment="krb5-server is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047212" version="1" comment="krb5 is &lt;1.5.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047222" version="1" comment="xen-devel is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047223" version="1" comment="xen-doc-html is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047224" version="1" comment="xen-doc-pdf is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047225" version="1" comment="xen-doc-ps is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047226" version="1" comment="xen-libs is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047227" version="1" comment="xen-tools-ioemu is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047228" version="1" comment="xen-tools is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047229" version="1" comment="xen is &lt;3.0.3_11774-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047243" version="1" comment="te_ams is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047244" version="1" comment="te_cont is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047245" version="1" comment="te_dvilj is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047246" version="1" comment="te_eplai is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047247" version="1" comment="te_kpath is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047248" version="1" comment="te_latex is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047249" version="1" comment="te_mpost is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047250" version="1" comment="te_nfs is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047251" version="1" comment="te_omega is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047252" version="1" comment="te_ptex is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047253" version="1" comment="te_web is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047254" version="1" comment="tetex is &lt;3.0-60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047260" version="1" comment="epiphany-devel is &lt;2.16.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047261" version="1" comment="epiphany-doc is &lt;2.16.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047262" version="1" comment="epiphany-extensions is &lt;2.16.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047263" version="1" comment="epiphany is &lt;2.16.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034571" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034572" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034573" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034574" version="1" comment="seamonkey-dom-inspector is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034575" version="1" comment="seamonkey-irc is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034576" version="1" comment="seamonkey-mail is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034577" version="1" comment="seamonkey-spellchecker is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034578" version="1" comment="seamonkey-venkman is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034579" version="1" comment="seamonkey is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034580" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034581" version="1" comment="MozillaFirefox is &lt;2.0.0.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047371" version="1" comment="cifs-mount is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047372" version="1" comment="ldapsmb is &lt;1.34b-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047373" version="1" comment="libmsrpc-devel is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047374" version="1" comment="libmsrpc is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047375" version="1" comment="libsmbclient-32bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047376" version="1" comment="libsmbclient-64bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047377" version="1" comment="libsmbclient-devel is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047378" version="1" comment="libsmbclient is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047379" version="1" comment="samba-32bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047380" version="1" comment="samba-64bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047381" version="1" comment="samba-client-32bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047382" version="1" comment="samba-client-64bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047383" version="1" comment="samba-client is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047384" version="1" comment="samba-doc is &lt;3.0.23d-19.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047385" version="1" comment="samba-krb-printing is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047386" version="1" comment="samba-pdb is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047387" version="1" comment="samba-python is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047388" version="1" comment="samba-vscan is &lt;0.3.6b-98.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047389" version="1" comment="samba-winbind-32bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047390" version="1" comment="samba-winbind-64bit is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047391" version="1" comment="samba-winbind is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047392" version="1" comment="samba is &lt;3.0.23d-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047395" version="1" comment="cacti is &lt;0.8.6h-36.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047401" version="1" comment="emacs-el is &lt;21.3-254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047402" version="1" comment="emacs-info is &lt;21.3-254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047403" version="1" comment="emacs-nox is &lt;21.3-254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047404" version="1" comment="emacs-x11 is &lt;21.3-254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047405" version="1" comment="emacs is &lt;21.3-254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047408" version="1" comment="htdig is &lt;3.2.0b6-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047409" version="1" comment="wireshark-devel is &lt;0.99.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047410" version="1" comment="wireshark is &lt;0.99.5-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047414" version="1" comment="gnump3d is &lt;2.9.8-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047415" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047416" version="1" comment="kernel-default is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047417" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047418" version="1" comment="kernel-kdump is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047419" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047420" version="1" comment="kernel-source is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047421" version="1" comment="kernel-syms is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047422" version="1" comment="kernel-xen is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047423" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047428" version="1" comment="yast2-core-devel is &lt;2.14.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047429" version="1" comment="yast2-core is &lt;2.14.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047441" version="1" comment="asterisk-alsa is &lt;1.2.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047442" version="1" comment="asterisk-odbc is &lt;1.2.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047443" version="1" comment="asterisk-pgsql is &lt;1.2.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047444" version="1" comment="asterisk-spandsp is &lt;1.2.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047445" version="1" comment="asterisk-zaptel is &lt;1.2.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047446" version="1" comment="asterisk is &lt;1.2.13-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047448" version="1" comment="rsync is &lt;2.6.8-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047451" version="1" comment="squid is &lt;2.6.STABLE6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047460" version="1" comment="libxml2-32bit is &lt;2.6.26-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047461" version="1" comment="libxml2-64bit is &lt;2.6.26-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047462" version="1" comment="libxml2-devel-32bit is &lt;2.6.26-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047463" version="1" comment="libxml2-devel-64bit is &lt;2.6.26-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047464" version="1" comment="libxml2-devel is &lt;2.6.26-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047465" version="1" comment="libxml2-python is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047466" version="1" comment="libxml2 is &lt;2.6.26-28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034670" version="1" comment="clamav-db is &lt;0.92-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033716" version="1" comment="clamav is &lt;0.92-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047475" version="1" comment="libexif-32bit is &lt;0.6.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047476" version="1" comment="libexif-64bit is &lt;0.6.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047477" version="1" comment="libexif is &lt;0.6.14-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047479" version="1" comment="libexif5 is &lt;0.5.12-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047480" version="1" comment="libexiv2-devel is &lt;0.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047481" version="1" comment="libexiv2 is &lt;0.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047482" version="1" comment="apache2-devel is &lt;2.2.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047483" version="1" comment="apache2-doc is &lt;2.2.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047484" version="1" comment="apache2-example-pages is &lt;2.2.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047485" version="1" comment="apache2-prefork is &lt;2.2.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047486" version="1" comment="apache2-worker is &lt;2.2.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047487" version="1" comment="apache2 is &lt;2.2.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047514" version="1" comment="NX is &lt;1.5.0-77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034687" version="1" comment="opera is &lt;9.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047517" version="1" comment="libxfcegui4 is &lt;4.2.3-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034692" version="1" comment="clamav-db is &lt;0.93-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034693" version="1" comment="clamav is &lt;0.93-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047521" version="1" comment="dovecot is &lt;1.0.rc14-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047530" version="1" comment="libcdio-32bit is &lt;0.77-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047531" version="1" comment="libcdio-64bit is &lt;0.77-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047532" version="1" comment="libcdio-devel is &lt;0.77-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047533" version="1" comment="libcdio is &lt;0.77-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047551" version="1" comment="openldap2-back-meta is &lt;2.3.27-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047552" version="1" comment="openldap2-back-perl is &lt;2.3.27-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047553" version="1" comment="openldap2-devel-32bit is &lt;2.3.27-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047554" version="1" comment="openldap2-devel-64bit is &lt;2.3.27-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047555" version="1" comment="openldap2-devel is &lt;2.3.27-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047556" version="1" comment="openldap2 is &lt;2.3.27-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047581" version="1" comment="kernel-bigsmp is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047582" version="1" comment="kernel-default is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047583" version="1" comment="kernel-iseries64 is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047584" version="1" comment="kernel-kdump is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047585" version="1" comment="kernel-ppc64 is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047586" version="1" comment="kernel-source is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047587" version="1" comment="kernel-syms is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047588" version="1" comment="kernel-xen is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047589" version="1" comment="kernel-xenpae is &lt;2.6.18.8-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034738" version="1" comment="seamonkey-dom-inspector is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034739" version="1" comment="seamonkey-irc is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034740" version="1" comment="seamonkey-mail is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034741" version="1" comment="seamonkey-spellchecker is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034742" version="1" comment="seamonkey-venkman is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034743" version="1" comment="seamonkey is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034744" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034745" version="1" comment="MozillaFirefox is &lt;2.0.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034746" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034748" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034749" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034750" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047654" version="1" comment="epiphany-devel is &lt;2.16.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047655" version="1" comment="epiphany-doc is &lt;2.16.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047656" version="1" comment="epiphany-extensions is &lt;2.16.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047657" version="1" comment="epiphany is &lt;2.16.1-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034755" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034757" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034758" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034759" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034760" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034761" version="1" comment="MozillaFirefox is &lt;2.0.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034762" version="1" comment="seamonkey-dom-inspector is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034763" version="1" comment="seamonkey-irc is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034764" version="1" comment="seamonkey-mail is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034765" version="1" comment="seamonkey-spellchecker is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034766" version="1" comment="seamonkey-venkman is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034767" version="1" comment="seamonkey is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047683" version="1" comment="cups-client is &lt;1.2.7-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047684" version="1" comment="cups-devel is &lt;1.2.7-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047685" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047686" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047687" version="1" comment="cups-libs is &lt;1.2.7-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047688" version="1" comment="cups is &lt;1.2.7-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047695" version="1" comment="cups-client is &lt;1.2.7-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047696" version="1" comment="cups-devel is &lt;1.2.7-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047697" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047698" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047699" version="1" comment="cups-libs is &lt;1.2.7-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047700" version="1" comment="cups is &lt;1.2.7-12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047716" version="1" comment="krb5-32bit is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047717" version="1" comment="krb5-64bit is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047718" version="1" comment="krb5-apps-clients is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047719" version="1" comment="krb5-apps-servers is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047720" version="1" comment="krb5-client is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047721" version="1" comment="krb5-devel-32bit is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047722" version="1" comment="krb5-devel-64bit is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047723" version="1" comment="krb5-devel is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047724" version="1" comment="krb5-server is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047725" version="1" comment="krb5 is &lt;1.5.1-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047730" version="1" comment="evolution-devel is &lt;2.8.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047731" version="1" comment="evolution-pilot is &lt;2.8.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047732" version="1" comment="evolution is &lt;2.8.2-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047739" version="1" comment="xine-devel is &lt;1.1.2-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047740" version="1" comment="xine-extra is &lt;1.1.2-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047741" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047742" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047743" version="1" comment="xine-lib is &lt;1.1.2-40.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047744" version="1" comment="xine-ui-32bit is &lt;0.99.4-84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047745" version="1" comment="xine-ui-64bit is &lt;0.99.4-84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047746" version="1" comment="xine-ui is &lt;0.99.4-84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047771" version="1" comment="bind-chrootenv is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047772" version="1" comment="bind-devel-64bit is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047773" version="1" comment="bind-devel is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047774" version="1" comment="bind-doc is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047775" version="1" comment="bind-libs-32bit is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047776" version="1" comment="bind-libs-64bit is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047777" version="1" comment="bind-libs is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047778" version="1" comment="bind-utils is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047779" version="1" comment="bind is &lt;9.3.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047780" version="1" comment="moodle-af is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047781" version="1" comment="moodle-ar is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047782" version="1" comment="moodle-be is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047783" version="1" comment="moodle-bg is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047784" version="1" comment="moodle-bs is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047785" version="1" comment="moodle-ca is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047786" version="1" comment="moodle-cs is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047787" version="1" comment="moodle-da is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047788" version="1" comment="moodle-de is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047789" version="1" comment="moodle-el is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047790" version="1" comment="moodle-es is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047791" version="1" comment="moodle-et is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047792" version="1" comment="moodle-eu is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047793" version="1" comment="moodle-fa is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047794" version="1" comment="moodle-fi is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047795" version="1" comment="moodle-fr is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047796" version="1" comment="moodle-ga is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047797" version="1" comment="moodle-gl is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047798" version="1" comment="moodle-he is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047799" version="1" comment="moodle-hi is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047800" version="1" comment="moodle-hr is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047801" version="1" comment="moodle-hu is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047802" version="1" comment="moodle-id is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047803" version="1" comment="moodle-is is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047804" version="1" comment="moodle-it is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047805" version="1" comment="moodle-ja is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047806" version="1" comment="moodle-ka is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047807" version="1" comment="moodle-km is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047808" version="1" comment="moodle-kn is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047809" version="1" comment="moodle-ko is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047810" version="1" comment="moodle-lt is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047811" version="1" comment="moodle-lv is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047812" version="1" comment="moodle-mi_tn is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047813" version="1" comment="moodle-ms is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047814" version="1" comment="moodle-nl is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047815" version="1" comment="moodle-nn is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047816" version="1" comment="moodle-no is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047817" version="1" comment="moodle-pl is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047818" version="1" comment="moodle-pt is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047819" version="1" comment="moodle-ro is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047820" version="1" comment="moodle-ru is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047821" version="1" comment="moodle-sk is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047822" version="1" comment="moodle-sl is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047823" version="1" comment="moodle-so is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047824" version="1" comment="moodle-sq is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047825" version="1" comment="moodle-sr is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047826" version="1" comment="moodle-sv is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047827" version="1" comment="moodle-th is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047828" version="1" comment="moodle-tl is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047829" version="1" comment="moodle-tr is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047830" version="1" comment="moodle-uk is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047831" version="1" comment="moodle-vi is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047832" version="1" comment="moodle-zh_cn is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047833" version="1" comment="moodle is &lt;1.7.2-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047839" version="1" comment="boost-64bit is &lt;1.33.1-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047840" version="1" comment="boost-devel-64bit is &lt;1.33.1-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047841" version="1" comment="boost-devel is &lt;1.33.1-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047842" version="1" comment="boost-doc is &lt;1.33.1-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047843" version="1" comment="boost is &lt;1.33.1-44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047854" version="1" comment="xine-devel is &lt;1.1.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047855" version="1" comment="xine-extra is &lt;1.1.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047856" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047857" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047858" version="1" comment="xine-lib is &lt;1.1.2-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034873" version="1" comment="clamav-db is &lt;0.92.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033747" version="1" comment="clamav is &lt;0.92.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047861" version="1" comment="xdg-utils is &lt;1.0.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047886" version="1" comment="ghostscript-fonts-other is &lt;8.15.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047887" version="1" comment="ghostscript-fonts-rus is &lt;8.15.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047888" version="1" comment="ghostscript-fonts-std is &lt;8.15.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047889" version="1" comment="ghostscript-library is &lt;8.15.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047890" version="1" comment="ghostscript-omni is &lt;8.15.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047891" version="1" comment="ghostscript-x11 is &lt;8.15.3-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047892" version="1" comment="libgimpprint-devel is &lt;4.2.7-103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047893" version="1" comment="libgimpprint is &lt;4.2.7-103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034884" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034885" version="1" comment="MozillaFirefox is &lt;2.0.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047902" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047903" version="1" comment="MozillaThunderbird is &lt;1.5.0.14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034888" version="1" comment="seamonkey-dom-inspector is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034889" version="1" comment="seamonkey-irc is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034890" version="1" comment="seamonkey-mail is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034891" version="1" comment="seamonkey-spellchecker is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034892" version="1" comment="seamonkey-venkman is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034893" version="1" comment="seamonkey is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047904" version="1" comment="epiphany-devel is &lt;2.16.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047905" version="1" comment="epiphany-doc is &lt;2.16.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047906" version="1" comment="epiphany-extensions is &lt;2.16.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047907" version="1" comment="epiphany is &lt;2.16.1-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034898" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034900" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034901" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034902" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047921" version="1" comment="xine-devel is &lt;1.1.2-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047922" version="1" comment="xine-extra is &lt;1.1.2-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047923" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047924" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047925" version="1" comment="xine-lib is &lt;1.1.2-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047926" version="1" comment="xine-ui-32bit is &lt;0.99.4-84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047927" version="1" comment="xine-ui-64bit is &lt;0.99.4-84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047928" version="1" comment="xine-ui is &lt;0.99.4-84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047935" version="1" comment="tk-32bit is &lt;8.4.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047936" version="1" comment="tk-64bit is &lt;8.4.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047937" version="1" comment="tk-devel is &lt;8.4.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047938" version="1" comment="tk is &lt;8.4.14-15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047942" version="1" comment="mailman is &lt;2.1.9-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047968" version="1" comment="dbus-1-32bit is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047969" version="1" comment="dbus-1-64bit is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047970" version="1" comment="dbus-1-devel-doc is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047971" version="1" comment="dbus-1-devel is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047972" version="1" comment="dbus-1-glib-32bit is &lt;0.71-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047973" version="1" comment="dbus-1-glib-64bit is &lt;0.71-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047974" version="1" comment="dbus-1-glib-devel is &lt;0.71-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047975" version="1" comment="dbus-1-glib is &lt;0.71-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047976" version="1" comment="dbus-1-mono is &lt;0.63-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047977" version="1" comment="dbus-1-python is &lt;0.71-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047978" version="1" comment="dbus-1-qt3-32bit is &lt;0.62-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047979" version="1" comment="dbus-1-qt3-64bit is &lt;0.62-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047980" version="1" comment="dbus-1-qt3-devel is &lt;0.62-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047981" version="1" comment="dbus-1-qt3 is &lt;0.62-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047982" version="1" comment="dbus-1-x11 is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047983" version="1" comment="dbus-1 is &lt;1.0.0-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047995" version="1" comment="cups-client is &lt;1.2.7-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047996" version="1" comment="cups-devel is &lt;1.2.7-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047997" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047998" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047999" version="1" comment="cups-libs is &lt;1.2.7-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048000" version="1" comment="cups is &lt;1.2.7-12.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034931" version="1" comment="acroread is &lt;8.1.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048139" version="1" comment="gnumeric is &lt;1.6.3-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048143" version="1" comment="geronimo-jetty-servlet-container is &lt;1.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048144" version="1" comment="geronimo-tomcat-servlet-container is &lt;1.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048145" version="1" comment="geronimo is &lt;1.1-23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048147" version="1" comment="cacti is &lt;0.8.6h-36.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034942" version="1" comment="acroread is &lt;8.1.2-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048150" version="1" comment="gnome-screensaver is &lt;2.16.1-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048153" version="1" comment="unzip is &lt;5.52-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048156" version="1" comment="net-snmp-32bit is &lt;5.4.rc2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048157" version="1" comment="net-snmp-64bit is &lt;5.4.rc2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048158" version="1" comment="net-snmp-devel-64bit is &lt;5.4.rc2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048159" version="1" comment="net-snmp-devel is &lt;5.4.rc2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048160" version="1" comment="net-snmp is &lt;5.4.rc2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048161" version="1" comment="perl-SNMP is &lt;5.4.rc2-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048190" version="1" comment="lighttpd-mod_cml is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048191" version="1" comment="lighttpd-mod_magnet is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048192" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048193" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048194" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048195" version="1" comment="lighttpd-mod_webdav is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048196" version="1" comment="lighttpd is &lt;1.4.13-41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048197" version="1" comment="moodle-af is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048198" version="1" comment="moodle-ar is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048199" version="1" comment="moodle-be is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048200" version="1" comment="moodle-bg is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048201" version="1" comment="moodle-bs is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048202" version="1" comment="moodle-ca is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048203" version="1" comment="moodle-cs is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048204" version="1" comment="moodle-da is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048205" version="1" comment="moodle-de is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048206" version="1" comment="moodle-el is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048207" version="1" comment="moodle-es is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048208" version="1" comment="moodle-et is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048209" version="1" comment="moodle-eu is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048210" version="1" comment="moodle-fa is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048211" version="1" comment="moodle-fi is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048212" version="1" comment="moodle-fr is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048213" version="1" comment="moodle-ga is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048214" version="1" comment="moodle-gl is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048215" version="1" comment="moodle-he is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048216" version="1" comment="moodle-hi is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048217" version="1" comment="moodle-hr is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048218" version="1" comment="moodle-hu is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048219" version="1" comment="moodle-id is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048220" version="1" comment="moodle-is is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048221" version="1" comment="moodle-it is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048222" version="1" comment="moodle-ja is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048223" version="1" comment="moodle-ka is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048224" version="1" comment="moodle-km is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048225" version="1" comment="moodle-kn is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048226" version="1" comment="moodle-ko is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048227" version="1" comment="moodle-lt is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048228" version="1" comment="moodle-lv is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048229" version="1" comment="moodle-mi_tn is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048230" version="1" comment="moodle-ms is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048231" version="1" comment="moodle-nl is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048232" version="1" comment="moodle-nn is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048233" version="1" comment="moodle-no is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048234" version="1" comment="moodle-pl is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048235" version="1" comment="moodle-pt is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048236" version="1" comment="moodle-ro is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048237" version="1" comment="moodle-ru is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048238" version="1" comment="moodle-sk is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048239" version="1" comment="moodle-sl is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048240" version="1" comment="moodle-so is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048241" version="1" comment="moodle-sq is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048242" version="1" comment="moodle-sr is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048243" version="1" comment="moodle-sv is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048244" version="1" comment="moodle-th is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048245" version="1" comment="moodle-tl is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048246" version="1" comment="moodle-tr is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048247" version="1" comment="moodle-uk is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048248" version="1" comment="moodle-vi is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048249" version="1" comment="moodle-zh_cn is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048250" version="1" comment="moodle is &lt;1.7.2-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048253" version="1" comment="wireshark-devel is &lt;0.99.5-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048254" version="1" comment="wireshark is &lt;0.99.5-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035018" version="1" comment="opera is &lt;9.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048260" version="1" comment="ImageMagick-Magick++-devel is &lt;6.3.0.0-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048261" version="1" comment="ImageMagick-Magick++ is &lt;6.3.0.0-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048262" version="1" comment="ImageMagick-devel is &lt;6.3.0.0-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048263" version="1" comment="ImageMagick is &lt;6.3.0.0-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048264" version="1" comment="perl-PerlMagick is &lt;6.3.0.0-27.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048265" version="1" comment="GraphicsMagick-c++-devel is &lt;1.1.7-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048266" version="1" comment="GraphicsMagick-c++ is &lt;1.1.7-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048267" version="1" comment="GraphicsMagick-devel is &lt;1.1.7-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048268" version="1" comment="GraphicsMagick is &lt;1.1.7-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048269" version="1" comment="perl-GraphicsMagick is &lt;1.1.7-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048290" version="1" comment="cifs-mount is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048291" version="1" comment="ldapsmb is &lt;1.34b-27.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048292" version="1" comment="libmsrpc-devel is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048293" version="1" comment="libmsrpc is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048294" version="1" comment="libsmbclient-32bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048295" version="1" comment="libsmbclient-64bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048296" version="1" comment="libsmbclient-devel is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048297" version="1" comment="libsmbclient is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048298" version="1" comment="samba-32bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048299" version="1" comment="samba-64bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048300" version="1" comment="samba-client-32bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048301" version="1" comment="samba-client-64bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048302" version="1" comment="samba-client is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048303" version="1" comment="samba-krb-printing is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048304" version="1" comment="samba-pdb is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048305" version="1" comment="samba-python is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048306" version="1" comment="samba-vscan is &lt;0.3.6b-98.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048307" version="1" comment="samba-winbind-32bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048308" version="1" comment="samba-winbind-64bit is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048309" version="1" comment="samba-winbind is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048310" version="1" comment="samba is &lt;3.0.23d-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048356" version="1" comment="evolution-devel is &lt;2.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048357" version="1" comment="evolution-pilot is &lt;2.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048358" version="1" comment="evolution is &lt;2.8.2-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048359" version="1" comment="rxvt-unicode is &lt;7.9-26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048368" version="1" comment="ruby-devel is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048369" version="1" comment="ruby-doc-html is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048370" version="1" comment="ruby-doc-ri is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048371" version="1" comment="ruby-examples is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048372" version="1" comment="ruby-test-suite is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048373" version="1" comment="ruby-tk is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048374" version="1" comment="ruby is &lt;1.8.5-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048382" version="1" comment="phpMyAdmin is &lt;2.9.1.1-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048384" version="1" comment="sarg is &lt;2.2.2-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048392" version="1" comment="java-1_4_2-sun-alsa is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048393" version="1" comment="java-1_4_2-sun-demo is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048394" version="1" comment="java-1_4_2-sun-devel is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048395" version="1" comment="java-1_4_2-sun-jdbc is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048396" version="1" comment="java-1_4_2-sun-plugin is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048397" version="1" comment="java-1_4_2-sun-src is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048398" version="1" comment="java-1_4_2-sun is &lt;1.4.2_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048406" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048407" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048408" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048409" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048410" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048411" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048412" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update14-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048413" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048414" version="1" comment="tomcat5-webapps is &lt;5.0.30-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048415" version="1" comment="tomcat5 is &lt;5.0.30-65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048427" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048428" version="1" comment="MozillaThunderbird is &lt;1.5.0.14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035097" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035098" version="1" comment="MozillaFirefox is &lt;2.0.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048431" version="1" comment="horde is &lt;3.1.3-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048440" version="1" comment="viewvc is &lt;1.0.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048461" version="1" comment="asterisk-alsa is &lt;1.2.13-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048462" version="1" comment="asterisk-odbc is &lt;1.2.13-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048463" version="1" comment="asterisk-pgsql is &lt;1.2.13-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048464" version="1" comment="asterisk-spandsp is &lt;1.2.13-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048465" version="1" comment="asterisk-zaptel is &lt;1.2.13-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048466" version="1" comment="asterisk is &lt;1.2.13-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048471" version="1" comment="bzip2-32bit is &lt;1.0.3-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048472" version="1" comment="bzip2-64bit is &lt;1.0.3-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048473" version="1" comment="bzip2 is &lt;1.0.3-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048483" version="1" comment="xgl is &lt;cvs_060522-45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048491" version="1" comment="epiphany-devel is &lt;2.16.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048492" version="1" comment="epiphany-doc is &lt;2.16.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048493" version="1" comment="epiphany-extensions is &lt;2.16.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048494" version="1" comment="epiphany is &lt;2.16.1-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035112" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035114" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035115" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035116" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048507" version="1" comment="libpng-32bit is &lt;1.2.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048508" version="1" comment="libpng-64bit is &lt;1.2.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048509" version="1" comment="libpng-devel-32bit is &lt;1.2.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048510" version="1" comment="libpng-devel-64bit is &lt;1.2.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048511" version="1" comment="libpng-devel is &lt;1.2.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048512" version="1" comment="libpng is &lt;1.2.12-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048513" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048514" version="1" comment="php5-bcmath is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048515" version="1" comment="php5-bz2 is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048516" version="1" comment="php5-calendar is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048517" version="1" comment="php5-ctype is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048518" version="1" comment="php5-curl is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048519" version="1" comment="php5-dba is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048520" version="1" comment="php5-dbase is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048521" version="1" comment="php5-devel is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048522" version="1" comment="php5-dom is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048523" version="1" comment="php5-exif is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048524" version="1" comment="php5-fastcgi is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048525" version="1" comment="php5-ftp is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048526" version="1" comment="php5-gd is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048527" version="1" comment="php5-gettext is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048528" version="1" comment="php5-gmp is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048529" version="1" comment="php5-hash is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048530" version="1" comment="php5-iconv is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048531" version="1" comment="php5-imap is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048532" version="1" comment="php5-json is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048533" version="1" comment="php5-ldap is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048534" version="1" comment="php5-mbstring is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048535" version="1" comment="php5-mcrypt is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048536" version="1" comment="php5-mhash is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048537" version="1" comment="php5-mysql is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048538" version="1" comment="php5-ncurses is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048539" version="1" comment="php5-odbc is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048540" version="1" comment="php5-openssl is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048541" version="1" comment="php5-pcntl is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048542" version="1" comment="php5-pdo is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048543" version="1" comment="php5-pear is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048544" version="1" comment="php5-pgsql is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048545" version="1" comment="php5-posix is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048546" version="1" comment="php5-pspell is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048547" version="1" comment="php5-readline is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048548" version="1" comment="php5-shmop is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048549" version="1" comment="php5-snmp is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048550" version="1" comment="php5-soap is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048551" version="1" comment="php5-sockets is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048552" version="1" comment="php5-sqlite is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048553" version="1" comment="php5-suhosin is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048554" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048555" version="1" comment="php5-sysvsem is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048556" version="1" comment="php5-sysvshm is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048557" version="1" comment="php5-tidy is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048558" version="1" comment="php5-tokenizer is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048559" version="1" comment="php5-wddx is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048560" version="1" comment="php5-xmlreader is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048561" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048562" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048563" version="1" comment="php5-xsl is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048564" version="1" comment="php5-zip is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048565" version="1" comment="php5-zlib is &lt;5.2.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035178" version="1" comment="clamav-db is &lt;0.94-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033770" version="1" comment="clamav is &lt;0.94-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048571" version="1" comment="libvorbis-32bit is &lt;1.1.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048572" version="1" comment="libvorbis-64bit is &lt;1.1.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048573" version="1" comment="libvorbis-devel is &lt;1.1.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048574" version="1" comment="libvorbis is &lt;1.1.2-37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048575" version="1" comment="bind-chrootenv is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048576" version="1" comment="bind-devel-64bit is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048577" version="1" comment="bind-devel is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048578" version="1" comment="bind-doc is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048579" version="1" comment="bind-libs-32bit is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048580" version="1" comment="bind-libs-64bit is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048581" version="1" comment="bind-libs is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048582" version="1" comment="bind-utils is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048583" version="1" comment="bind is &lt;9.3.5P1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035193" version="1" comment="dnsmasq is &lt;2.45-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035194" version="1" comment="namazu-cgi is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035195" version="1" comment="namazu-devel is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035196" version="1" comment="namazu is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048626" version="1" comment="xine-devel is &lt;1.1.2-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048627" version="1" comment="xine-extra is &lt;1.1.2-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048628" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048629" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048630" version="1" comment="xine-lib is &lt;1.1.2-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048631" version="1" comment="xine-ui-32bit is &lt;0.99.4-84.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048632" version="1" comment="xine-ui-64bit is &lt;0.99.4-84.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048633" version="1" comment="xine-ui is &lt;0.99.4-84.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048638" version="1" comment="openssh-askpass is &lt;4.4p1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048639" version="1" comment="openssh is &lt;4.4p1-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048640" version="1" comment="moodle-af is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048641" version="1" comment="moodle-ar is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048642" version="1" comment="moodle-be is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048643" version="1" comment="moodle-bg is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048644" version="1" comment="moodle-bs is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048645" version="1" comment="moodle-ca is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048646" version="1" comment="moodle-cs is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048647" version="1" comment="moodle-da is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048648" version="1" comment="moodle-de is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048649" version="1" comment="moodle-el is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048650" version="1" comment="moodle-es is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048651" version="1" comment="moodle-et is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048652" version="1" comment="moodle-eu is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048653" version="1" comment="moodle-fa is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048654" version="1" comment="moodle-fi is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048655" version="1" comment="moodle-fr is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048656" version="1" comment="moodle-ga is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048657" version="1" comment="moodle-gl is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048658" version="1" comment="moodle-he is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048659" version="1" comment="moodle-hi is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048660" version="1" comment="moodle-hr is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048661" version="1" comment="moodle-hu is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048662" version="1" comment="moodle-id is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048663" version="1" comment="moodle-is is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048664" version="1" comment="moodle-it is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048665" version="1" comment="moodle-ja is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048666" version="1" comment="moodle-ka is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048667" version="1" comment="moodle-km is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048668" version="1" comment="moodle-kn is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048669" version="1" comment="moodle-ko is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048670" version="1" comment="moodle-lt is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048671" version="1" comment="moodle-lv is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048672" version="1" comment="moodle-mi_tn is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048673" version="1" comment="moodle-ms is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048674" version="1" comment="moodle-nl is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048675" version="1" comment="moodle-nn is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048676" version="1" comment="moodle-no is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048677" version="1" comment="moodle-pl is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048678" version="1" comment="moodle-pt is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048679" version="1" comment="moodle-ro is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048680" version="1" comment="moodle-ru is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048681" version="1" comment="moodle-sk is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048682" version="1" comment="moodle-sl is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048683" version="1" comment="moodle-so is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048684" version="1" comment="moodle-sq is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048685" version="1" comment="moodle-sr is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048686" version="1" comment="moodle-sv is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048687" version="1" comment="moodle-th is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048688" version="1" comment="moodle-tl is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048689" version="1" comment="moodle-tr is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048690" version="1" comment="moodle-uk is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048691" version="1" comment="moodle-vi is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048692" version="1" comment="moodle-zh_cn is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048693" version="1" comment="moodle is &lt;1.7.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048694" version="1" comment="otrs is &lt;2.1.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048701" version="1" comment="lighttpd-mod_cml is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048702" version="1" comment="lighttpd-mod_magnet is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048703" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048704" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048705" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048706" version="1" comment="lighttpd-mod_webdav is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048707" version="1" comment="lighttpd is &lt;1.4.13-41.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048708" version="1" comment="wireshark-devel is &lt;0.99.5-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048709" version="1" comment="wireshark is &lt;0.99.5-5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048727" version="1" comment="squid is &lt;2.6.STABLE6-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048760" version="1" comment="pdns-recursor is &lt;3.1.3-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048787" version="1" comment="python-32bit is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048788" version="1" comment="python-64bit is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048789" version="1" comment="python-curses is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048790" version="1" comment="python-demo is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048791" version="1" comment="python-devel is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048792" version="1" comment="python-gdbm is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048793" version="1" comment="python-idle is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048794" version="1" comment="python-tk is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048795" version="1" comment="python-xml is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048796" version="1" comment="python is &lt;2.5-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048807" version="1" comment="xscreensaver is &lt;5.01-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048820" version="1" comment="vorbis-tools is &lt;1.1.1-39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048824" version="1" comment="gstreamer010-plugins-good-doc is &lt;0.10.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048825" version="1" comment="gstreamer010-plugins-good-extra is &lt;0.10.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048826" version="1" comment="gstreamer010-plugins-good is &lt;0.10.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048833" version="1" comment="xine-devel is &lt;1.1.2-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048834" version="1" comment="xine-extra is &lt;1.1.2-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048835" version="1" comment="xine-lib-32bit is &lt;1.1.2-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048836" version="1" comment="xine-lib-64bit is &lt;1.1.2-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048837" version="1" comment="xine-lib is &lt;1.1.2-40.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048838" version="1" comment="xine-ui-32bit is &lt;0.99.4-84.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048839" version="1" comment="xine-ui-64bit is &lt;0.99.4-84.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048840" version="1" comment="xine-ui is &lt;0.99.4-84.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048860" version="1" comment="gpdf is &lt;2.10.0-82.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048861" version="1" comment="cups-client is &lt;1.2.7-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048862" version="1" comment="cups-devel is &lt;1.2.7-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048863" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048864" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048865" version="1" comment="cups-libs is &lt;1.2.7-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048866" version="1" comment="cups is &lt;1.2.7-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048871" version="1" comment="poppler-devel is &lt;0.5.4-33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048872" version="1" comment="poppler-glib is &lt;0.5.4-33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048873" version="1" comment="poppler-qt is &lt;0.5.4-33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048874" version="1" comment="poppler-tools is &lt;0.5.4-33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048875" version="1" comment="poppler is &lt;0.5.4-33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035343" version="1" comment="opera is &lt;9.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048876" version="1" comment="libxslt-32bit is &lt;1.1.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048877" version="1" comment="libxslt-64bit is &lt;1.1.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048878" version="1" comment="libxslt-devel-32bit is &lt;1.1.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048879" version="1" comment="libxslt-devel-64bit is &lt;1.1.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048880" version="1" comment="libxslt-devel is &lt;1.1.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048881" version="1" comment="libxslt is &lt;1.1.17-25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048890" version="1" comment="rdesktop is &lt;1.5.0-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048891" version="1" comment="freetype2-32bit is &lt;2.3.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048892" version="1" comment="freetype2-64bit is &lt;2.3.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048893" version="1" comment="freetype2-devel-32bit is &lt;2.3.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048894" version="1" comment="freetype2-devel-64bit is &lt;2.3.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048895" version="1" comment="freetype2-devel is &lt;2.3.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048896" version="1" comment="freetype2 is &lt;2.3.5-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048918" version="1" comment="asterisk-alsa is &lt;1.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048919" version="1" comment="asterisk-odbc is &lt;1.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048920" version="1" comment="asterisk-pgsql is &lt;1.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048921" version="1" comment="asterisk-spandsp is &lt;1.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048922" version="1" comment="asterisk-zaptel is &lt;1.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048923" version="1" comment="asterisk is &lt;1.2.13-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048925" version="1" comment="sarg is &lt;2.2.2-24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048935" version="1" comment="perl-32bit is &lt;5.8.8-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048936" version="1" comment="perl-64bit is &lt;5.8.8-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048937" version="1" comment="perl is &lt;5.8.8-36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048960" version="1" comment="gnutls-32bit is &lt;1.4.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048961" version="1" comment="gnutls-64bit is &lt;1.4.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048962" version="1" comment="gnutls-devel-32bit is &lt;1.4.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048963" version="1" comment="gnutls-devel-64bit is &lt;1.4.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048964" version="1" comment="gnutls-devel is &lt;1.4.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048965" version="1" comment="gnutls is &lt;1.4.4-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048966" version="1" comment="licq-icqnd is &lt;1.3.4-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048967" version="1" comment="licq is &lt;1.3.4-29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048969" version="1" comment="qemu is &lt;0.8.2-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049038" version="1" comment="xemacs-packages-el is &lt;20060510-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049039" version="1" comment="xemacs-packages-info is &lt;20060510-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049040" version="1" comment="xemacs-packages is &lt;20060510-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049044" version="1" comment="emacs-el is &lt;21.3-257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049045" version="1" comment="emacs-info is &lt;21.3-257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049046" version="1" comment="emacs-nox is &lt;21.3-257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049047" version="1" comment="emacs-x11 is &lt;21.3-257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049048" version="1" comment="emacs is &lt;21.3-257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049065" version="1" comment="opensc-devel is &lt;0.11.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049066" version="1" comment="opensc is &lt;0.11.1-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049074" version="1" comment="opensc-devel is &lt;0.11.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049075" version="1" comment="opensc is &lt;0.11.1-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049083" version="1" comment="OpenOffice_org-af is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049084" version="1" comment="OpenOffice_org-ar is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049085" version="1" comment="OpenOffice_org-be-BY is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049086" version="1" comment="OpenOffice_org-bg is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049087" version="1" comment="OpenOffice_org-ca is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049088" version="1" comment="OpenOffice_org-cs is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049089" version="1" comment="OpenOffice_org-cy is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049090" version="1" comment="OpenOffice_org-da is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049091" version="1" comment="OpenOffice_org-de is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049092" version="1" comment="OpenOffice_org-el is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049093" version="1" comment="OpenOffice_org-en-GB is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049094" version="1" comment="OpenOffice_org-es is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049095" version="1" comment="OpenOffice_org-et is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049096" version="1" comment="OpenOffice_org-fi is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049097" version="1" comment="OpenOffice_org-fr is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049098" version="1" comment="OpenOffice_org-galleries is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049099" version="1" comment="OpenOffice_org-gnome is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049100" version="1" comment="OpenOffice_org-gu-IN is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049101" version="1" comment="OpenOffice_org-hi-IN is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049102" version="1" comment="OpenOffice_org-hr is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049103" version="1" comment="OpenOffice_org-hu is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049104" version="1" comment="OpenOffice_org-it is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049105" version="1" comment="OpenOffice_org-ja is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049106" version="1" comment="OpenOffice_org-kde is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049107" version="1" comment="OpenOffice_org-km is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049108" version="1" comment="OpenOffice_org-ko is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049109" version="1" comment="OpenOffice_org-lt is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049110" version="1" comment="OpenOffice_org-mk is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049111" version="1" comment="OpenOffice_org-mono is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049112" version="1" comment="OpenOffice_org-nb is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049113" version="1" comment="OpenOffice_org-nl is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049114" version="1" comment="OpenOffice_org-nn is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049115" version="1" comment="OpenOffice_org-officebean is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049116" version="1" comment="OpenOffice_org-pa-IN is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049117" version="1" comment="OpenOffice_org-pl is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049118" version="1" comment="OpenOffice_org-pt-BR is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049119" version="1" comment="OpenOffice_org-pt is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049120" version="1" comment="OpenOffice_org-ru is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049121" version="1" comment="OpenOffice_org-rw is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049122" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049123" version="1" comment="OpenOffice_org-sdk is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049124" version="1" comment="OpenOffice_org-sk is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049125" version="1" comment="OpenOffice_org-sl is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049126" version="1" comment="OpenOffice_org-sr-CS is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049127" version="1" comment="OpenOffice_org-st is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049128" version="1" comment="OpenOffice_org-sv is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049129" version="1" comment="OpenOffice_org-tr is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049130" version="1" comment="OpenOffice_org-ts is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049131" version="1" comment="OpenOffice_org-vi is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049132" version="1" comment="OpenOffice_org-xh is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049133" version="1" comment="OpenOffice_org-zh-CN is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049134" version="1" comment="OpenOffice_org-zh-TW is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049135" version="1" comment="OpenOffice_org-zu is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049136" version="1" comment="OpenOffice_org is &lt;2.0.4-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049235" version="1" comment="libtiff-32bit is &lt;3.8.2-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049236" version="1" comment="libtiff-64bit is &lt;3.8.2-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049237" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049238" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049239" version="1" comment="libtiff-devel is &lt;3.8.2-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049240" version="1" comment="libtiff is &lt;3.8.2-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049258" version="1" comment="mtr-gtk is &lt;0.72-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049259" version="1" comment="mtr is &lt;0.72-20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049286" version="1" comment="bluez-cups is &lt;3.7-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049287" version="1" comment="bluez-libs is &lt;3.7-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049288" version="1" comment="bluez-test is &lt;3.7-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049289" version="1" comment="bluez-utils is &lt;3.7-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049300" version="1" comment="squirrelmail is &lt;1.4.10a-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049325" version="1" comment="opensuse-updater is &lt;0.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049329" version="1" comment="imlib2-devel is &lt;1.2.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049330" version="1" comment="imlib2-filters is &lt;1.2.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049331" version="1" comment="imlib2-loaders is &lt;1.2.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049332" version="1" comment="imlib2 is &lt;1.2.1-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035531" version="1" comment="acroread is &lt;8.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035532" version="1" comment="acroread is &lt;8.1.2_SU1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049338" version="1" comment="courier-authlib-devel is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049339" version="1" comment="courier-authlib-ldap is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049340" version="1" comment="courier-authlib-mysql is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049341" version="1" comment="courier-authlib-pgsql is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049342" version="1" comment="courier-authlib-pipe is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049343" version="1" comment="courier-authlib-userdb is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049344" version="1" comment="courier-authlib is &lt;0.58-38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049352" version="1" comment="libexiv2-devel is &lt;0.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049353" version="1" comment="libexiv2 is &lt;0.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035546" version="1" comment="clamav-db is &lt;0.93.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033814" version="1" comment="clamav is &lt;0.93.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035547" version="1" comment="clamav-db is &lt;0.93.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033813" version="1" comment="clamav is &lt;0.93.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035548" version="1" comment="opera is &lt;9.50-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035551" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035552" version="1" comment="MozillaFirefox is &lt;2.0.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049376" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.14-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049377" version="1" comment="MozillaThunderbird is &lt;1.5.0.14-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035559" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035560" version="1" comment="MozillaFirefox is &lt;2.0.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049406" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049407" version="1" comment="php5-bcmath is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049408" version="1" comment="php5-bz2 is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049409" version="1" comment="php5-calendar is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049410" version="1" comment="php5-ctype is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049411" version="1" comment="php5-curl is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049412" version="1" comment="php5-dba is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049413" version="1" comment="php5-dbase is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049414" version="1" comment="php5-devel is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049415" version="1" comment="php5-dom is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049416" version="1" comment="php5-exif is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049417" version="1" comment="php5-fastcgi is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049418" version="1" comment="php5-ftp is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049419" version="1" comment="php5-gd is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049420" version="1" comment="php5-gettext is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049421" version="1" comment="php5-gmp is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049422" version="1" comment="php5-hash is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049423" version="1" comment="php5-iconv is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049424" version="1" comment="php5-imap is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049425" version="1" comment="php5-json is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049426" version="1" comment="php5-ldap is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049427" version="1" comment="php5-mbstring is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049428" version="1" comment="php5-mcrypt is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049429" version="1" comment="php5-mhash is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049430" version="1" comment="php5-mysql is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049431" version="1" comment="php5-ncurses is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049432" version="1" comment="php5-odbc is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049433" version="1" comment="php5-openssl is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049434" version="1" comment="php5-pcntl is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049435" version="1" comment="php5-pdo is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049436" version="1" comment="php5-pear is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049437" version="1" comment="php5-pgsql is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049438" version="1" comment="php5-posix is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049439" version="1" comment="php5-pspell is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049440" version="1" comment="php5-readline is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049441" version="1" comment="php5-shmop is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049442" version="1" comment="php5-snmp is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049443" version="1" comment="php5-soap is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049444" version="1" comment="php5-sockets is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049445" version="1" comment="php5-sqlite is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049446" version="1" comment="php5-suhosin is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049447" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049448" version="1" comment="php5-sysvsem is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049449" version="1" comment="php5-sysvshm is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049450" version="1" comment="php5-tidy is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049451" version="1" comment="php5-tokenizer is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049452" version="1" comment="php5-wddx is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049453" version="1" comment="php5-xmlreader is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049454" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049455" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049456" version="1" comment="php5-xsl is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049457" version="1" comment="php5-zip is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049458" version="1" comment="php5-zlib is &lt;5.2.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049465" version="1" comment="gaim-devel is &lt;1.5.0-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049466" version="1" comment="gaim is &lt;1.5.0-88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049482" version="1" comment="libxslt-32bit is &lt;1.1.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049483" version="1" comment="libxslt-64bit is &lt;1.1.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049484" version="1" comment="libxslt-devel-32bit is &lt;1.1.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049485" version="1" comment="libxslt-devel-64bit is &lt;1.1.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049486" version="1" comment="libxslt-devel is &lt;1.1.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049487" version="1" comment="libxslt is &lt;1.1.17-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049494" version="1" comment="postfix-devel is &lt;2.3.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049495" version="1" comment="postfix-mysql is &lt;2.3.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049496" version="1" comment="postfix-postgresql is &lt;2.3.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049497" version="1" comment="postfix is &lt;2.3.2-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049505" version="1" comment="hplip-hpijs is &lt;1.6.10-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049506" version="1" comment="hplip is &lt;1.6.10-27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049522" version="1" comment="openldap2-back-meta is &lt;2.3.27-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049523" version="1" comment="openldap2-back-perl is &lt;2.3.27-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049524" version="1" comment="openldap2-client-32bit is &lt;2.3.27-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049525" version="1" comment="openldap2-client-64bit is &lt;2.3.27-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049526" version="1" comment="openldap2-client is &lt;2.3.27-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049527" version="1" comment="openldap2-devel-32bit is &lt;2.3.27-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049528" version="1" comment="openldap2-devel-64bit is &lt;2.3.27-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049529" version="1" comment="openldap2-devel is &lt;2.3.27-32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049530" version="1" comment="openldap2 is &lt;2.3.27-34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035644" version="1" comment="opera is &lt;9.51-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035651" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035652" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035653" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035654" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035655" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035656" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035657" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049579" version="1" comment="java-1_4_2-sun-alsa is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049580" version="1" comment="java-1_4_2-sun-demo is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049581" version="1" comment="java-1_4_2-sun-devel is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049582" version="1" comment="java-1_4_2-sun-jdbc is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049583" version="1" comment="java-1_4_2-sun-plugin is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049584" version="1" comment="java-1_4_2-sun-src is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049585" version="1" comment="java-1_4_2-sun is &lt;1.4.2_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049617" version="1" comment="GraphicsMagick-c++-devel is &lt;1.1.7-35.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049618" version="1" comment="GraphicsMagick-c++ is &lt;1.1.7-35.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049619" version="1" comment="GraphicsMagick-devel is &lt;1.1.7-35.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049620" version="1" comment="GraphicsMagick is &lt;1.1.7-35.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049621" version="1" comment="perl-GraphicsMagick is &lt;1.1.7-35.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049631" version="1" comment="wireshark-devel is &lt;0.99.5-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049632" version="1" comment="wireshark is &lt;0.99.5-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049635" version="1" comment="libzypp-devel is &lt;2.17.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049636" version="1" comment="libzypp is &lt;2.17.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049637" version="1" comment="zypper is &lt;0.6.15-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049665" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049666" version="1" comment="tomcat5-webapps is &lt;5.0.30-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049667" version="1" comment="tomcat5 is &lt;5.0.30-67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049684" version="1" comment="libxml2-32bit is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049685" version="1" comment="libxml2-64bit is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049686" version="1" comment="libxml2-devel-32bit is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049687" version="1" comment="libxml2-devel-64bit is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049688" version="1" comment="libxml2-devel is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049689" version="1" comment="libxml2 is &lt;2.6.26-31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049697" version="1" comment="moodle-af is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049698" version="1" comment="moodle-ar is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049699" version="1" comment="moodle-be is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049700" version="1" comment="moodle-bg is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049701" version="1" comment="moodle-bs is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049702" version="1" comment="moodle-ca is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049703" version="1" comment="moodle-cs is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049704" version="1" comment="moodle-da is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049705" version="1" comment="moodle-de is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049706" version="1" comment="moodle-el is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049707" version="1" comment="moodle-es is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049708" version="1" comment="moodle-et is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049709" version="1" comment="moodle-eu is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049710" version="1" comment="moodle-fa is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049711" version="1" comment="moodle-fi is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049712" version="1" comment="moodle-fr is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049713" version="1" comment="moodle-ga is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049714" version="1" comment="moodle-gl is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049715" version="1" comment="moodle-he is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049716" version="1" comment="moodle-hi is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049717" version="1" comment="moodle-hr is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049718" version="1" comment="moodle-hu is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049719" version="1" comment="moodle-id is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049720" version="1" comment="moodle-is is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049721" version="1" comment="moodle-it is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049722" version="1" comment="moodle-ja is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049723" version="1" comment="moodle-ka is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049724" version="1" comment="moodle-km is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049725" version="1" comment="moodle-kn is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049726" version="1" comment="moodle-ko is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049727" version="1" comment="moodle-lt is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049728" version="1" comment="moodle-lv is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049729" version="1" comment="moodle-mi_tn is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049730" version="1" comment="moodle-ms is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049731" version="1" comment="moodle-nl is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049732" version="1" comment="moodle-nn is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049733" version="1" comment="moodle-no is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049734" version="1" comment="moodle-pl is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049735" version="1" comment="moodle-pt is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049736" version="1" comment="moodle-ro is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049737" version="1" comment="moodle-ru is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049738" version="1" comment="moodle-sk is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049739" version="1" comment="moodle-sl is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049740" version="1" comment="moodle-so is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049741" version="1" comment="moodle-sq is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049742" version="1" comment="moodle-sr is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049743" version="1" comment="moodle-sv is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049744" version="1" comment="moodle-th is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049745" version="1" comment="moodle-tl is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049746" version="1" comment="moodle-tr is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049747" version="1" comment="moodle-uk is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049748" version="1" comment="moodle-vi is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049749" version="1" comment="moodle-zh_cn is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049750" version="1" comment="moodle is &lt;1.7.2-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049806" version="1" comment="pdns-backend-ldap is &lt;2.9.20-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049807" version="1" comment="pdns-backend-mysql is &lt;2.9.20-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049808" version="1" comment="pdns-backend-postgresql is &lt;2.9.20-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049809" version="1" comment="pdns-backend-sqlite2 is &lt;2.9.20-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049810" version="1" comment="pdns is &lt;2.9.20-16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049817" version="1" comment="bytefx-data-mysql is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049818" version="1" comment="ibm-data-db2 is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049819" version="1" comment="mono-core-32bit is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049820" version="1" comment="mono-core is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049821" version="1" comment="mono-data-firebird is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049822" version="1" comment="mono-data-oracle is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049823" version="1" comment="mono-data-postgresql is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049824" version="1" comment="mono-data-sqlite is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049825" version="1" comment="mono-data-sybase is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049826" version="1" comment="mono-data is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049827" version="1" comment="mono-devel is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049828" version="1" comment="mono-extras is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049829" version="1" comment="mono-jscript is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049830" version="1" comment="mono-locale-extras is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049831" version="1" comment="mono-nunit is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049832" version="1" comment="mono-web is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049833" version="1" comment="mono-winforms is &lt;1.1.18.1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049903" version="1" comment="jasper is &lt;1.701.0-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049904" version="1" comment="libjasper-32bit is &lt;1.701.0-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049905" version="1" comment="libjasper-64bit is &lt;1.701.0-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049906" version="1" comment="libjasper is &lt;1.701.0-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049931" version="1" comment="git-arch is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049932" version="1" comment="git-core is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049933" version="1" comment="git-cvs is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049934" version="1" comment="git-email is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049935" version="1" comment="git-svn is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049936" version="1" comment="git is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049937" version="1" comment="gitk is &lt;1.5.2.4-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049973" version="1" comment="cups-client is &lt;1.2.7-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049974" version="1" comment="cups-devel is &lt;1.2.7-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049975" version="1" comment="cups-libs-32bit is &lt;1.2.7-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049976" version="1" comment="cups-libs-64bit is &lt;1.2.7-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049977" version="1" comment="cups-libs is &lt;1.2.7-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049978" version="1" comment="cups is &lt;1.2.7-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050006" version="1" comment="ipsec-tools is &lt;0.6.5-42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050109" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050110" version="1" comment="php5-bcmath is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050111" version="1" comment="php5-bz2 is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050112" version="1" comment="php5-calendar is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050113" version="1" comment="php5-ctype is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050114" version="1" comment="php5-curl is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050115" version="1" comment="php5-dba is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050116" version="1" comment="php5-dbase is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050117" version="1" comment="php5-devel is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050118" version="1" comment="php5-dom is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050119" version="1" comment="php5-exif is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050120" version="1" comment="php5-fastcgi is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050121" version="1" comment="php5-ftp is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050122" version="1" comment="php5-gd is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050123" version="1" comment="php5-gettext is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050124" version="1" comment="php5-gmp is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050125" version="1" comment="php5-hash is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050126" version="1" comment="php5-iconv is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050127" version="1" comment="php5-imap is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050128" version="1" comment="php5-json is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050129" version="1" comment="php5-ldap is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050130" version="1" comment="php5-mbstring is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050131" version="1" comment="php5-mcrypt is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050132" version="1" comment="php5-mhash is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050133" version="1" comment="php5-mysql is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050134" version="1" comment="php5-ncurses is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050135" version="1" comment="php5-odbc is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050136" version="1" comment="php5-openssl is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050137" version="1" comment="php5-pcntl is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050138" version="1" comment="php5-pdo is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050139" version="1" comment="php5-pear is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050140" version="1" comment="php5-pgsql is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050141" version="1" comment="php5-posix is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050142" version="1" comment="php5-pspell is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050143" version="1" comment="php5-readline is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050144" version="1" comment="php5-shmop is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050145" version="1" comment="php5-snmp is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050146" version="1" comment="php5-soap is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050147" version="1" comment="php5-sockets is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050148" version="1" comment="php5-sqlite is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050149" version="1" comment="php5-suhosin is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050150" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050151" version="1" comment="php5-sysvsem is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050152" version="1" comment="php5-sysvshm is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050153" version="1" comment="php5-tidy is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050154" version="1" comment="php5-tokenizer is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050155" version="1" comment="php5-wddx is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050156" version="1" comment="php5-xmlreader is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050157" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050158" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050159" version="1" comment="php5-xsl is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050160" version="1" comment="php5-zip is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050161" version="1" comment="php5-zlib is &lt;5.2.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050162" version="1" comment="squirrelmail is &lt;1.4.9a-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050163" version="1" comment="squirrelmail is &lt;1.4.9a-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050214" version="1" comment="pam_krb5-32bit is &lt;2.2.11-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050215" version="1" comment="pam_krb5-64bit is &lt;2.2.11-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050216" version="1" comment="pam_krb5 is &lt;2.2.11-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050279" version="1" comment="dbus-1-32bit is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050280" version="1" comment="dbus-1-64bit is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050281" version="1" comment="dbus-1-devel-doc is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050282" version="1" comment="dbus-1-devel is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050283" version="1" comment="dbus-1-x11 is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050284" version="1" comment="dbus-1 is &lt;1.0.0-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050303" version="1" comment="enscript is &lt;1.6.4-41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050314" version="1" comment="wireshark-devel is &lt;0.99.5-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050315" version="1" comment="wireshark is &lt;0.99.5-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050339" version="1" comment="mysql-Max is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050340" version="1" comment="mysql-bench is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050341" version="1" comment="mysql-client is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050342" version="1" comment="mysql-debug is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050343" version="1" comment="mysql-devel is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050344" version="1" comment="mysql-shared-32bit is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050345" version="1" comment="mysql-shared-64bit is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050346" version="1" comment="mysql-shared is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050347" version="1" comment="mysql is &lt;5.0.26-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050361" version="1" comment="pam_mount is &lt;0.18-22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050366" version="1" comment="rubygem-activerecord is &lt;1.14.4-18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050374" version="1" comment="imp is &lt;4.1.3-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050378" version="1" comment="libxml2-32bit is &lt;2.6.26-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050379" version="1" comment="libxml2-64bit is &lt;2.6.26-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050380" version="1" comment="libxml2-devel-32bit is &lt;2.6.26-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050381" version="1" comment="libxml2-devel-64bit is &lt;2.6.26-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050382" version="1" comment="libxml2-devel is &lt;2.6.26-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050383" version="1" comment="libxml2 is &lt;2.6.26-35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050405" version="1" comment="libxml2-32bit is &lt;2.6.26-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050406" version="1" comment="libxml2-64bit is &lt;2.6.26-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050407" version="1" comment="libxml2-devel-32bit is &lt;2.6.26-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050408" version="1" comment="libxml2-devel-64bit is &lt;2.6.26-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050409" version="1" comment="libxml2-devel is &lt;2.6.26-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050410" version="1" comment="libxml2 is &lt;2.6.26-33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050426" version="1" comment="lighttpd-mod_cml is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050427" version="1" comment="lighttpd-mod_magnet is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050428" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050429" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050430" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050431" version="1" comment="lighttpd-mod_webdav is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050432" version="1" comment="lighttpd is &lt;1.4.13-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050454" version="1" comment="net-snmp-32bit is &lt;5.4.rc2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050455" version="1" comment="net-snmp-64bit is &lt;5.4.rc2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050456" version="1" comment="net-snmp-devel-64bit is &lt;5.4.rc2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050457" version="1" comment="net-snmp-devel is &lt;5.4.rc2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050458" version="1" comment="net-snmp is &lt;5.4.rc2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050459" version="1" comment="perl-SNMP is &lt;5.4.rc2-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050802" version="1" comment="freeradius-devel is &lt;1.1.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050803" version="1" comment="freeradius-dialupadmin is &lt;1.1.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050804" version="1" comment="freeradius is &lt;1.1.3-30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050836" version="1" comment="graphviz-devel is &lt;2.6-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050837" version="1" comment="graphviz-tcl is &lt;2.6-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050838" version="1" comment="graphviz is &lt;2.6-46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050925" version="1" comment="lynx is &lt;2.8.6_rel2-19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035993" version="1" comment="opera is &lt;9.60-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035994" version="1" comment="opera is &lt;9.61-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035997" version="1" comment="opera is &lt;9.62-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050951" version="1" comment="valgrind is &lt;3.2.3-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051010" version="1" comment="MozillaThunderbird-translations is &lt;1.5.0.14-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051011" version="1" comment="MozillaThunderbird is &lt;1.5.0.14-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036036" version="1" comment="clamav-db is &lt;0.94.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033880" version="1" comment="clamav is &lt;0.94.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051160" version="1" comment="imlib2-devel is &lt;1.2.1-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051161" version="1" comment="imlib2-filters is &lt;1.2.1-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051162" version="1" comment="imlib2-loaders is &lt;1.2.1-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051163" version="1" comment="imlib2 is &lt;1.2.1-48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051168" version="1" comment="rubygem-actionpack is &lt;1.12.5-21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036405"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat5-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat5-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-spellchecker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capi4hylafax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkimg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-unstable-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-unstable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-c++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-Magick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-Magick++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-iseries64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xenpae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrelmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mhash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-ui-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-ui-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-wordprocessing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mediawiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pptpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-galleries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ulogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smb4k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kchmviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chmlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chmlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-lib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xgl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ekiga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asterisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktorrent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-mi_tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-tl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-zh_cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmsrpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmsrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sr-CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sylpheed-claws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-DNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>RealPlayer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>festival-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>festival</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-nsplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-database-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-database-psql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-database</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-illustration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-planning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-presentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-spreadsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-octave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>balsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-ioemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_ams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_cont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_eplai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_kpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_mpost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_ptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htdig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnump3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asterisk-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asterisk-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asterisk-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asterisk-spandsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asterisk-zaptel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxfcegui4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jetty-servlet-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-tomcat-servlet-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>licq-icqnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>licq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mtr-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mtr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensuse-updater</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-pipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-userdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gaim-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gaim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">10.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.30-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.5-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8d-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.027-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.69.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.0.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.88.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.96-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.1-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9a-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9a-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.22-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.0-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6h-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.14-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.1.4-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6.3-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.6-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.124.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.4-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_update13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update12-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_update15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.STABLE6-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.23-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.2-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.39-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.60.8-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.0-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.0-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-30.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs_060522-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9a-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9a-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.13-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1.1-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1.20061027-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.17-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.13-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.STABLE6-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.0.0-27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.0.0-27.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.30-13.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.01-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.48.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-102.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.rc14-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23d-19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23d-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-98.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1.cvs20061019-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.14-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.42_1-12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.701.0-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-678</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.22-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.0-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1.20061027-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.32-51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.17-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-251</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.2-56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-51.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.713-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.14-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.59-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.5-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.32-53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.91.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.13-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.4-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.22-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-30.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-608</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.96-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5a70-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.1-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.7-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-242.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-102.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.115.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.151.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-82.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-58.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.23-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.1-42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.91.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.5-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1-33.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-30.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23d-19.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-98.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-41.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4p1-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-35.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.0.0-27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8d-23.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.13-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8d-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.14-13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18.1-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.10-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_update16-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.39-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.24-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1.1-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.27-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-30.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:253-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.rc2-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3_11774-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.10-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.10-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23d-19.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-27.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23d-19.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-98.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6h-36.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-254</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0b6-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.8-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.13-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.STABLE6-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.26-28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.26-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.92-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.14-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.rc14-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.77-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.27-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.27-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18.8-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-84.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.2-56.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33.1-44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.92.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.3-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.14-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-84.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.14-15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.63-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.62-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6h-36.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.rc2-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-41.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.0.0-27.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23d-19.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-27.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-98.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.9-26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1.1-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_update17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update14-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.14-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.13-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs_060522-45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.14-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5P1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.18-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-84.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4p1-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-41.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.STABLE6-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-19.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.01-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-40.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-84.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-82.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-33.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.27-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.17-25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.5-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.13-31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20060510-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-38.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10a-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2_SU1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.58-38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.3-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.50-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.16-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.14-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.17-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.10-27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.27-34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.27-32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.51-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_update18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-35.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.15-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.20-16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18.1-12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.701.0-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2.4-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9a-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9a-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.11-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.4-18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.26-35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.26-33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-41.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.rc2-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6_rel2-19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.60-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.61-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.62-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.14-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-21</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
